VYPR
Medium severity6.5NVD Advisory· Published Aug 1, 2025· Updated Apr 15, 2026

CVE-2025-50868

CVE-2025-50868

Description

A SQL Injection vulnerability exists in the takeassessment2.php file of CloudClassroom-PHP-Project 1.0. The Q4 POST parameter is not properly sanitized before being used in SQL queries.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A time-based blind SQL injection in takeassessment2.php of CloudClassroom-PHP-Project 1.0 allows attackers to extract database information via the unsanitized Q4 parameter.

CVE-2025-50868 describes a SQL injection vulnerability in the takeassessment2.php file of CloudClassroom-PHP-Project 1.0. The root cause is the lack of proper sanitization of the Q4 POST parameter before its use in database queries [1]. The application fails to validate or escape user input, enabling an attacker to inject arbitrary SQL commands.

The vulnerability is exploitable via a crafted POST request to the vulnerable endpoint, requiring no prior authentication. The attacker must be able to send HTTP requests to the server. The provided payload 5550'XOR(555*if(now()=sysdate(),sleep(6),0))XOR'Z triggers a time delay of 6 seconds when the injection is successful, confirming a time-based blind SQL injection [1]. This technique allows data extraction by observing response times.

Successful exploitation can lead to unauthorized access to, or modification of, the underlying database. An attacker may extract sensitive information such as user credentials, personal data, or other application secrets. The CVSS v3 base score of 6.5 (Medium) reflects the potential for significant information disclosure, though exploitation is not trivial.

As of the publication date, no official patch has been announced for CloudClassroom-PHP-Project 1.0. The vendor should implement parameterized queries or input validation for the Q4 parameter. Users are advised to restrict network access to the application or apply web application firewall rules to mitigate the risk until a fix is available.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.