First published: Sun Mar 16 2025(Updated: )
A vulnerability classified as critical was found in DayCloud StudentManage 1.0. This vulnerability affects unknown code of the file /admin/adminScoreUrl of the component Login Endpoint. The manipulation of the argument query leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
student-manage | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-2351 is classified as a critical vulnerability due to its potential for remote exploitation.
CVE-2025-2351 affects the login endpoint and allows remote attackers to perform SQL injection via manipulated query arguments.
Exploiting CVE-2025-2351 can lead to unauthorized access to databases, data leakage, or complete system compromise.
To fix CVE-2025-2351, validate and sanitize all user inputs in the affected login endpoint to prevent SQL injection.
As of now, specific patches for CVE-2025-2351 have not been released, so immediate mitigation through input validation is recommended.