CVE-2025-26198

CloudClassroom-PHP-Project v1.0 contains a critical SQL Injection vulnerability in the loginlinkadmin.php component. The application fails to sanitize user-supplied input in the admin login form before directly including it in SQL queries. This allows unauthenticated attackers to inject arbitrary SQL payloads and bypass authentication, gaining unauthorized administrative access. The vulnerability is triggered when an attacker supplies specially crafted input in the username field, such as ' OR '1'='1, leading to complete compromise of the login mechanism and potential exposure of sensitive backend data.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:vishalmathur:cloudclassroom-php_project:1.0:*:*:*:*:*:*:*

History

09 Jul 2025, 18:31

Type Values Removed Values Added
CPE cpe:2.3:a:vishalmathur:cloudclassroom-php_project:1.0:*:*:*:*:*:*:*
First Time Vishalmathur cloudclassroom-php Project
Vishalmathur
References () https://gist.github.com/tansique-17/0776791b8edd4931216be452a6971f5e - () https://gist.github.com/tansique-17/0776791b8edd4931216be452a6971f5e - Exploit, Third Party Advisory
References () https://github.com/tansique-17/CVE-2025-26198/ - () https://github.com/tansique-17/CVE-2025-26198/ - Exploit, Third Party Advisory

20 Jun 2025, 16:15

Type Values Removed Values Added
References
  • () https://github.com/tansique-17/CVE-2025-26198/ -
Summary
  • (es) CloudClassroom-PHP-Project v.1.0 es vulnerable a la inyección SQL en loginlinkadmin.php, lo que permite a atacantes no autenticados eludir la autenticación y obtener acceso administrativo. La aplicación no depura correctamente las entradas del usuario antes de construir consultas SQL, lo que permite a un atacante manipular las consultas de la base de datos mediante payloads especialmente manipulados.
Summary (en) CloudClassroom-PHP-Project v.1.0 is vulnerable to SQL Injection in loginlinkadmin.php, allowing unauthenticated attackers to bypass authentication and gain administrative access. The application fails to properly sanitize user inputs before constructing SQL queries, enabling an attacker to manipulate database queries via specially crafted payloads (en) CloudClassroom-PHP-Project v1.0 contains a critical SQL Injection vulnerability in the loginlinkadmin.php component. The application fails to sanitize user-supplied input in the admin login form before directly including it in SQL queries. This allows unauthenticated attackers to inject arbitrary SQL payloads and bypass authentication, gaining unauthorized administrative access. The vulnerability is triggered when an attacker supplies specially crafted input in the username field, such as ' OR '1'='1, leading to complete compromise of the login mechanism and potential exposure of sensitive backend data.

18 Jun 2025, 19:15

Type Values Removed Values Added
CWE CWE-89
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

18 Jun 2025, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-18 18:15

Updated : 2025-07-09 18:31


NVD link : CVE-2025-26198

Mitre link : CVE-2025-26198

CVE.ORG link : CVE-2025-26198


JSON object : View

Products Affected

vishalmathur

  • cloudclassroom-php_project
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')