CVE-2026-6488
Description
A vulnerability was identified in QueryMine sms up to 7ab5a9ea196209611134525ffc18de25c57d9593. This vulnerability affects unknown code of the file admin/editcourse.php of the component GET Request Parameter Handler. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit is publicly available and might be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
SQL injection vulnerability in QueryMine sms admin/editcourse.php allows remote attackers to execute arbitrary SQL commands via the ID parameter, with public exploit available.
Vulnerability
Details
A SQL injection vulnerability exists in the QueryMine sms application up to commit 7ab5a9ea196209611134525ffc18de25c57d9593. The issue is present in the file admin/editcourse.php within the GET request parameter handler. The "ID" parameter is not properly sanitized before being used in SQL queries, allowing an attacker to inject arbitrary SQL commands. The project is a PHP-based student management system (SMS) that uses a MySQL database [1].
Exploitation
The vulnerability can be exploited remotely by sending a crafted HTTP GET request to the admin/editcourse.php endpoint with a malicious ID parameter. No authentication is explicitly required, but the endpoint is part of the admin panel, so access to this page may require prior authentication. However, the attack vector is remote, and the exploit has been publicly disclosed, increasing the risk of active exploitation.
Impact
Successful exploitation allows an attacker to perform SQL injection attacks, which can lead to unauthorized access to the database, data exfiltration, modification or deletion of records, and potentially full compromise of the application. Given the database may contain sensitive student information, the impact could be significant.
Mitigation
The vendor was contacted early but did not respond. As the product uses continuous delivery with rolling releases, no specific version details are available. Users are advised to apply the latest updates if available, or consider implementing input validation and parameterized queries to mitigate the risk until an official fix is released.
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.