CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
4Description
A SQL Injection vulnerability was discovered in the askquery.php file of CloudClassroom-PHP Project v1.0. The squeryx parameter accepts unsanitized input, which is passed directly into backend SQL queries.
Analysis
CVE-2025-46179 is a critical SQL injection vulnerability in CloudClassroom-PHP Project v1.0's askquery.php file, where the 'squeryx' parameter is passed directly into SQL queries without sanitization. This affects all installations of CloudClassroom-PHP v1.0 and allows unauthenticated remote attackers to execute arbitrary SQL commands, potentially leading to complete database compromise including data exfiltration, modification, and denial of service. The vulnerability has a CVSS 9.8 score reflecting its network-based exploitability with no authentication or user interaction required; active exploitation status and POC availability are unknown from the provided data.
Technical Context
The vulnerability exists in CloudClassroom-PHP Project v1.0, a web-based classroom management system written in PHP. The root cause is classified as CWE-89 (SQL Injection), a classic input validation flaw where user-supplied data from the 'squeryx' parameter is concatenated directly into SQL query strings without parameterized queries, prepared statements, or input validation. This occurs in the askquery.php file, suggesting the vulnerability is in a query/question handling endpoint. The affected technology stack includes PHP as the server-side language and likely MySQL/MariaDB as the database backend. The lack of prepared statement usage or input sanitization functions (such as mysqli_real_escape_string or, preferably, parameterized queries with bound parameters) allows attackers to inject arbitrary SQL syntax.
Affected Products
CloudClassroom-PHP Project, version 1.0 (all installations). CPE designation (estimated): cpe:2.3:a:cloudclassroom:cloudclassroom-php:1.0:*:*:*:*:*:*:*. The vulnerability affects the askquery.php component specifically. No vendor advisory or official patch reference is provided in the data; the project may be open-source (GitHub-hosted) requiring community patches or discontinued. Any deployment running CloudClassroom-PHP v1.0 with internet or intranet access to askquery.php is vulnerable.
Remediation
Immediate actions: (1) Disable or restrict network access to askquery.php and related query endpoints until patching is complete; (2) Implement Web Application Firewall (WAF) rules to detect/block SQL injection attempts (keywords: UNION, SELECT, OR 1=1, DROP, EXEC, etc.); (3) Monitor database logs for suspicious query patterns. Proper fixes: (1) Refactor askquery.php to use prepared statements with parameterized queries in PHP (mysqli_prepare/execute or PDO prepared statements) for all database interactions involving the 'squeryx' parameter; (2) Implement input validation and type-checking for the 'squeryx' parameter before any database operation; (3) Apply principle of least privilege—database user account running queries should have minimal permissions (SELECT-only if possible); (4) Check for available patches from CloudClassroom-PHP project repository (likely GitHub); if none available, consider migrating to maintained alternative. No specific patch version is provided, so contact the vendor or check the project's issue tracker.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-18756