CVE-2025-12277

7.3 HIGH

📋 TL;DR

This CVE describes a SQL injection vulnerability in Abdullah-Hasan-Sajjad Online-School's studentLogin.php file, specifically in the Email parameter. Attackers can remotely exploit this to execute arbitrary SQL commands on the database. All users running affected versions of this software are vulnerable.

💻 Affected Systems

Products:
  • Abdullah-Hasan-Sajjad Online-School
Versions: All versions up to commit f09dda77b4c29aa083ff57f4b1eb991b98b68883
Operating Systems: Any OS running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the /studentLogin.php endpoint specifically. The software uses rolling releases, so all installations before the fix are vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including data theft, data manipulation, authentication bypass, and potential remote code execution if database permissions allow.

🟠

Likely Case

Unauthorized access to student data, grade manipulation, account takeover, and potential privilege escalation.

🟢

If Mitigated

Limited impact with proper input validation and parameterized queries in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details are publicly available in the referenced GitHub document. The vulnerability is in a login page, making it easily accessible.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Vendor was contacted but did not respond. Consider workarounds or alternative software.

🔧 Temporary Workarounds

Input Validation and Sanitization

all

Implement server-side validation and sanitization of the Email parameter in studentLogin.php

Edit studentLogin.php to add: $email = mysqli_real_escape_string($connection, $_POST['Email']);

Web Application Firewall (WAF)

all

Deploy a WAF with SQL injection protection rules

🧯 If You Can't Patch

  • Disable or restrict access to /studentLogin.php endpoint
  • Implement network segmentation and isolate the vulnerable system

🔍 How to Verify

Check if Vulnerable:

Test the Email parameter in /studentLogin.php with SQL injection payloads like ' OR '1'='1

Check Version:

Check git commit hash: git log --oneline -1

Verify Fix Applied:

Verify that SQL injection payloads no longer work and return proper error handling

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL errors in application logs
  • Multiple failed login attempts with SQL-like patterns
  • Unexpected database queries from studentLogin.php

Network Indicators:

  • HTTP POST requests to /studentLogin.php containing SQL keywords
  • Unusual database connection patterns

SIEM Query:

source="web_logs" AND uri_path="/studentLogin.php" AND (request_body CONTAINS "' OR" OR request_body CONTAINS "UNION" OR request_body CONTAINS "SELECT *")

🔗 References

📤 Share & Export