A vulnerability was found in code-projects Simple Scheduling System 1.0. This issue affects some unknown processing of the file /schedulingsystem/addcourse.php. Performing manipulation of the argument corcode results in sql injection. The attack is possible to be carried out remotely. The exploit has been made public and could be used.
References
Link | Resource |
---|---|
https://code-projects.org/ | Product |
https://github.com/WANGshuyan2025/cve/issues/4 | Exploit Issue Tracking |
https://vuldb.com/?ctiid.326188 | Permissions Required VDB Entry |
https://vuldb.com/?id.326188 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.662444 | Third Party Advisory VDB Entry |
https://github.com/WANGshuyan2025/cve/issues/4 | Exploit Issue Tracking |
Configurations
History
03 Oct 2025, 13:36
Type | Values Removed | Values Added |
---|---|---|
First Time |
Fabianros simple Scheduling System
Fabianros |
|
References | () https://code-projects.org/ - Product | |
References | () https://github.com/WANGshuyan2025/cve/issues/4 - Exploit, Issue Tracking | |
References | () https://vuldb.com/?ctiid.326188 - Permissions Required, VDB Entry | |
References | () https://vuldb.com/?id.326188 - Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?submit.662444 - Third Party Advisory, VDB Entry | |
CPE | cpe:2.3:a:fabianros:simple_scheduling_system:1.0:*:*:*:*:*:*:* |
29 Sep 2025, 15:16
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/WANGshuyan2025/cve/issues/4 - |
28 Sep 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-09-28 15:15
Updated : 2025-10-03 13:36
NVD link : CVE-2025-11107
Mitre link : CVE-2025-11107
CVE.ORG link : CVE-2025-11107
JSON object : View
Products Affected
fabianros
- simple_scheduling_system