Submit #782202: halex CourseSEL 1.1.0 SQL Injectioninfo

Titelhalex CourseSEL 1.1.0 SQL Injection
BeschreibungA SQL Injection vulnerability exists in the CourseSEL system (a ThinkPHP 3.2 based application) due to the lack of parameterization and improper input sanitization in the Apps/Index/Controller/IndexController.class.php file. The check_sel method directly concatenates the user-supplied HTTP GET parameter seid into the SQL query string using the framework's where() method. An authenticated attacker with standard student privileges can exploit this vulnerability to trigger an Error-based SQL Injection, allowing them to bypass authorization, extract sensitive database schemas, and dump administrative credentials.
Quelle⚠️ https://github.com/zy606/Vulnerability-Report/tree/main/CourseSEL-SQLi
Benutzer
 Zyyyy (UID 96412)
Einreichung18.03.2026 09:52 (vor 20 Tagen)
Moderieren04.04.2026 08:42 (17 days later)
StatusAkzeptiert
VulDB Eintrag355290 [halex CourseSEL bis 1.1.0 HTTP GET Parameter IndexController.class.php check_sel seid SQL Injection]
Punkte20

Do you want to use VulDB in your project?

Use the official API to access entries easily!