CVE-2025-11107

A vulnerability was found in code-projects Simple Scheduling System 1.0. This issue affects some unknown processing of the file /schedulingsystem/addcourse.php. Performing manipulation of the argument corcode results in sql injection. The attack is possible to be carried out remotely. The exploit has been made public and could be used.
References
Link Resource
https://code-projects.org/ Product
https://github.com/WANGshuyan2025/cve/issues/4 Exploit Issue Tracking
https://vuldb.com/?ctiid.326188 Permissions Required VDB Entry
https://vuldb.com/?id.326188 Third Party Advisory VDB Entry
https://vuldb.com/?submit.662444 Third Party Advisory VDB Entry
https://github.com/WANGshuyan2025/cve/issues/4 Exploit Issue Tracking
Configurations

Configuration 1 (hide)

cpe:2.3:a:fabian:simple_scheduling_system:1.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-09-28 15:15

Updated : 2025-10-23 20:06


NVD link : CVE-2025-11107

Mitre link : CVE-2025-11107

CVE.ORG link : CVE-2025-11107


JSON object : View

Products Affected

fabian

  • simple_scheduling_system
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')