A SQL injection vulnerability exists in OS4Ed Open Source Information System Community v8.0 via the "student_id" and "TRANSFER{SCHOOL]" parameters in POST request sent to /TransferredOutModal.php.
References
Link | Resource |
---|---|
https://github.com/OS4ED/openSIS-Classic/ | Product |
https://opensis.com/ | Product |
https://resources.s4e.io/blog/opensis-student-information-system-0-day-vulnerability-cve-2021-41691/ | Third Party Advisory |
Configurations
History
09 Jul 2025, 19:07
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/OS4ED/openSIS-Classic/ - Product | |
References | () https://opensis.com/ - Product | |
References | () https://resources.s4e.io/blog/opensis-student-information-system-0-day-vulnerability-cve-2021-41691/ - Third Party Advisory | |
CPE | cpe:2.3:a:os4ed:opensis:8.0:*:*:*:community:*:*:* | |
First Time |
Os4ed
Os4ed opensis |
25 Jun 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-89 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
Summary |
|
24 Jun 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-06-24 16:15
Updated : 2025-07-09 19:07
NVD link : CVE-2021-41691
Mitre link : CVE-2021-41691
CVE.ORG link : CVE-2021-41691
JSON object : View
Products Affected
os4ed
- opensis
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')