VYPR
Medium severity6.3NVD Advisory· Published Apr 17, 2026· Updated Apr 29, 2026

CVE-2026-6488

CVE-2026-6488

Description

A vulnerability was identified in QueryMine sms up to 7ab5a9ea196209611134525ffc18de25c57d9593. This vulnerability affects unknown code of the file admin/editcourse.php of the component GET Request Parameter Handler. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit is publicly available and might be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

SQL injection vulnerability in QueryMine sms admin/editcourse.php allows remote attackers to execute arbitrary SQL commands via the ID parameter, with public exploit available.

Vulnerability

Details

A SQL injection vulnerability exists in the QueryMine sms application up to commit 7ab5a9ea196209611134525ffc18de25c57d9593. The issue is present in the file admin/editcourse.php within the GET request parameter handler. The "ID" parameter is not properly sanitized before being used in SQL queries, allowing an attacker to inject arbitrary SQL commands. The project is a PHP-based student management system (SMS) that uses a MySQL database [1].

Exploitation

The vulnerability can be exploited remotely by sending a crafted HTTP GET request to the admin/editcourse.php endpoint with a malicious ID parameter. No authentication is explicitly required, but the endpoint is part of the admin panel, so access to this page may require prior authentication. However, the attack vector is remote, and the exploit has been publicly disclosed, increasing the risk of active exploitation.

Impact

Successful exploitation allows an attacker to perform SQL injection attacks, which can lead to unauthorized access to the database, data exfiltration, modification or deletion of records, and potentially full compromise of the application. Given the database may contain sensitive student information, the impact could be significant.

Mitigation

The vendor was contacted early but did not respond. As the product uses continuous delivery with rolling releases, no specific version details are available. Users are advised to apply the latest updates if available, or consider implementing input validation and parameterized queries to mitigate the risk until an official fix is released.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1
  • Sms/Smsllm-fuzzy
    Range: <= 7ab5a9ea196209611134525ffc18de25c57d9593

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.