A flaw has been found in SourceCodester Online Class Record System 1.0. Affected by this issue is some unknown functionality of the file /admin/login.php. This manipulation of the argument user_email causes sql injection. The attack may be initiated remotely. The exploit has been published and may be used.
SourceCodester Online Class Record System login.php sql injection
Problem type
Affected products
SourceCodester
1.0 - AFFECTED
References
https://vuldb.com/?id.344654
https://vuldb.com/?ctiid.344654
https://vuldb.com/?submit.746510
https://github.com/xiaoccm07/cve/issues/1
https://www.sourcecodester.com/
GitHub Security Advisories
GHSA-3x5c-cv6h-7vvm
A flaw has been found in SourceCodester Online Class Record System 1.0. Affected by this issue is...
https://github.com/advisories/GHSA-3x5c-cv6h-7vvmA flaw has been found in SourceCodester Online Class Record System 1.0. Affected by this issue is some unknown functionality of the file /admin/login.php. This manipulation of the argument user_email causes sql injection. The attack may be initiated remotely. The exploit has been published and may be used.
https://nvd.nist.gov/vuln/detail/CVE-2026-2087
https://github.com/xiaoccm07/cve/issues/1
https://vuldb.com/?ctiid.344654
https://vuldb.com/?id.344654
https://vuldb.com/?submit.746510
https://www.sourcecodester.com
https://github.com/advisories/GHSA-3x5c-cv6h-7vvm
JSON source
https://cveawg.mitre.org/api/cve/CVE-2026-2087Click to expand
{
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"cveMetadata": {
"cveId": "CVE-2026-2087",
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"dateUpdated": "2026-02-07T14:02:06.864Z",
"dateReserved": "2026-02-06T08:23:17.187Z",
"datePublished": "2026-02-07T14:02:06.864Z",
"state": "PUBLISHED"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB",
"dateUpdated": "2026-02-07T14:02:06.864Z"
},
"title": "SourceCodester Online Class Record System login.php sql injection",
"descriptions": [
{
"lang": "en",
"value": "A flaw has been found in SourceCodester Online Class Record System 1.0. Affected by this issue is some unknown functionality of the file /admin/login.php. This manipulation of the argument user_email causes sql injection. The attack may be initiated remotely. The exploit has been published and may be used."
}
],
"affected": [
{
"vendor": "SourceCodester",
"product": "Online Class Record System",
"versions": [
{
"version": "1.0",
"status": "affected"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "SQL Injection",
"cweId": "CWE-89",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"lang": "en",
"description": "Injection",
"cweId": "CWE-74",
"type": "CWE"
}
]
}
],
"references": [
{
"url": "https://vuldb.com/?id.344654",
"name": "VDB-344654 | SourceCodester Online Class Record System login.php sql injection",
"tags": [
"vdb-entry",
"technical-description"
]
},
{
"url": "https://vuldb.com/?ctiid.344654",
"name": "VDB-344654 | CTI Indicators (IOB, IOC, TTP, IOA)",
"tags": [
"signature",
"permissions-required"
]
},
{
"url": "https://vuldb.com/?submit.746510",
"name": "Submit #746510 | SourceCodester Online Class Record System 1.0 SQL Injection",
"tags": [
"third-party-advisory"
]
},
{
"url": "https://github.com/xiaoccm07/cve/issues/1",
"tags": [
"exploit",
"issue-tracking"
]
},
{
"url": "https://www.sourcecodester.com/",
"tags": [
"product"
]
}
],
"metrics": [
{},
{
"cvssV3_1": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R",
"baseScore": 7.3,
"baseSeverity": "HIGH"
}
},
{
"cvssV3_0": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R",
"baseScore": 7.3,
"baseSeverity": "HIGH"
}
},
{
"cvssV2_0": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR",
"baseScore": 7.5
}
}
],
"timeline": [
{
"time": "2026-02-06T00:00:00.000Z",
"lang": "en",
"value": "Advisory disclosed"
},
{
"time": "2026-02-06T01:00:00.000Z",
"lang": "en",
"value": "VulDB entry created"
},
{
"time": "2026-02-06T09:28:21.000Z",
"lang": "en",
"value": "VulDB entry last update"
}
],
"credits": [
{
"lang": "en",
"value": "MrCC (VulDB User)",
"type": "reporter"
}
],
"tags": [
"x_freeware"
]
}
}
}