CVE-2026-25814
CRITICALCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
2Description
PlaciPy is a placement management system designed for educational institutions. In version 1.0.0, User-controlled query parameters are passed directly into DynamoDB query/filter construction without validation or sanitization.
Analysis
PlaciPy has an injection vulnerability allowing user input to be processed as commands — sixth critical flaw.
Sign in for full analysis, threat intelligence, and remediation guidance.
Remediation
Within 24 hours: Inventory all systems running PlaciPy 1.0.0 and isolate them from production networks if possible; disable public-facing access to PlaciPy; notify institutional leadership and legal teams. Within 7 days: Implement WAF rules to block malicious query parameter patterns; enable enhanced logging and monitoring for DynamoDB queries; conduct forensic analysis for evidence of exploitation. …
Sign in for detailed remediation steps.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today