A vulnerability was found in code-projects Simple Scheduling System 1.0. This issue affects some unknown processing of the file /schedulingsystem/addcourse.php. Performing manipulation of the argument corcode results in sql injection. The attack is possible to be carried out remotely. The exploit has been made public and could be used.
References
| Link | Resource |
|---|---|
| https://code-projects.org/ | Product |
| https://github.com/WANGshuyan2025/cve/issues/4 | Exploit Issue Tracking |
| https://vuldb.com/?ctiid.326188 | Permissions Required VDB Entry |
| https://vuldb.com/?id.326188 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.662444 | Third Party Advisory VDB Entry |
| https://github.com/WANGshuyan2025/cve/issues/4 | Exploit Issue Tracking |
Configurations
History
No history.
Information
Published : 2025-09-28 15:15
Updated : 2025-10-23 20:06
NVD link : CVE-2025-11107
Mitre link : CVE-2025-11107
CVE.ORG link : CVE-2025-11107
JSON object : View
Products Affected
fabian
- simple_scheduling_system
