VYPR
High severityNVD Advisory· Published May 9, 2026· Updated May 12, 2026

CVE-2026-8207

CVE-2026-8207

Description

Gibbon versions before v30.0.01 are affected by an authenticated SQL Injection vulnerability by abusing the Tracking/graphing https://github.com/GibbonEdu/core/blob/c431e25fdc874adece5d2dc7e408e9aa2d1abadb/modules/Tracking/graphing.php#L145 feature. Successful exploitation requires Teacher or higher privileges. Exploitation could result in unintended read/write activities to the underlying database.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Gibbon before v30.0.01 has an authenticated SQL injection in Tracking/graphing.php that enables database read/write by Teachers or higher.

Vulnerability

Overview

Gibbon versions prior to v30.0.01 contain an authenticated SQL injection vulnerability in the Tracking/graphing.php module. The flaw stems from unsafe handling of user-supplied input in a SQL query that constructs at line [1] of the source code. Specifically, the $dataType variable — which must be either 'attainment' or 'effort' — is directly concatenated into a dynamic SQL string without parameterization or proper sanitization [1]. This pattern of string interpolation and concatenation in the query leaves the application open to injection attacks.

Exploitation

Prerequisites

Exploitation requires Teacher or higher privileges, as the vulnerable code path only reachable when the user is authenticated and the $dataType parameter is set to 'attainment' or 'effort' [1]. An attacker with such access submit crafted POST parameters (gibbonPersonIDs, gibbonDepartmentIDs, and dataType) to trigger the injection [1]. No additional authentication bypass is required because the attacker already holds a valid account with sufficient permissions.

Potential

Impact

If successfully exploited, this vulnerability allows an attacker to perform unintended read and write operations on the underlying database [1]. Depending on the database permissions and the overall application architecture, this could lead to unauthorized access to sensitive school data (e.g., student records, grades, personal information) or compromise the integrity of the database (e.g., modifying grades, deleting records). The advisory notes that this injection could be chained with other vulnerabilities to achieve remote code execution (RCE) [1].

Mitigation

The vulnerability is addressed in Gibbon release v30.0.01 [2]. Administrators are strongly encouraged to upgrade to v30.0.01 or later to eliminate the SQL injection. The release notes credit Nikolai Makaroff at Project Black Security Services for identifying the issue [2]. No other workarounds are documented; upgrading is the recommended path.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.