CVE-2025-46179

| EUVD-2025-18756 CRITICAL
2025-06-20 [email protected]
9.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Analysis Generated
Mar 15, 2026 - 00:19 vuln.today
EUVD ID Assigned
Mar 15, 2026 - 00:19 euvd
EUVD-2025-18756
PoC Detected
Jun 26, 2025 - 14:48 vuln.today
Public exploit code
CVE Published
Jun 20, 2025 - 15:15 nvd
CRITICAL 9.8

Description

A SQL Injection vulnerability was discovered in the askquery.php file of CloudClassroom-PHP Project v1.0. The squeryx parameter accepts unsanitized input, which is passed directly into backend SQL queries.

Analysis

CVE-2025-46179 is a critical SQL injection vulnerability in CloudClassroom-PHP Project v1.0's askquery.php file, where the 'squeryx' parameter is passed directly into SQL queries without sanitization. This affects all installations of CloudClassroom-PHP v1.0 and allows unauthenticated remote attackers to execute arbitrary SQL commands, potentially leading to complete database compromise including data exfiltration, modification, and denial of service. The vulnerability has a CVSS 9.8 score reflecting its network-based exploitability with no authentication or user interaction required; active exploitation status and POC availability are unknown from the provided data.

Technical Context

The vulnerability exists in CloudClassroom-PHP Project v1.0, a web-based classroom management system written in PHP. The root cause is classified as CWE-89 (SQL Injection), a classic input validation flaw where user-supplied data from the 'squeryx' parameter is concatenated directly into SQL query strings without parameterized queries, prepared statements, or input validation. This occurs in the askquery.php file, suggesting the vulnerability is in a query/question handling endpoint. The affected technology stack includes PHP as the server-side language and likely MySQL/MariaDB as the database backend. The lack of prepared statement usage or input sanitization functions (such as mysqli_real_escape_string or, preferably, parameterized queries with bound parameters) allows attackers to inject arbitrary SQL syntax.

Affected Products

CloudClassroom-PHP Project, version 1.0 (all installations). CPE designation (estimated): cpe:2.3:a:cloudclassroom:cloudclassroom-php:1.0:*:*:*:*:*:*:*. The vulnerability affects the askquery.php component specifically. No vendor advisory or official patch reference is provided in the data; the project may be open-source (GitHub-hosted) requiring community patches or discontinued. Any deployment running CloudClassroom-PHP v1.0 with internet or intranet access to askquery.php is vulnerable.

Remediation

Immediate actions: (1) Disable or restrict network access to askquery.php and related query endpoints until patching is complete; (2) Implement Web Application Firewall (WAF) rules to detect/block SQL injection attempts (keywords: UNION, SELECT, OR 1=1, DROP, EXEC, etc.); (3) Monitor database logs for suspicious query patterns. Proper fixes: (1) Refactor askquery.php to use prepared statements with parameterized queries in PHP (mysqli_prepare/execute or PDO prepared statements) for all database interactions involving the 'squeryx' parameter; (2) Implement input validation and type-checking for the 'squeryx' parameter before any database operation; (3) Apply principle of least privilege—database user account running queries should have minimal permissions (SELECT-only if possible); (4) Check for available patches from CloudClassroom-PHP project repository (likely GitHub); if none available, consider migrating to maintained alternative. No specific patch version is provided, so contact the vendor or check the project's issue tracker.

Priority Score

69
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +49
POC: +20

Share

CVE-2025-46179 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy