Platform
php
Component
course-sel
Fixed in
1.0.1
1.1.1
CVE-2026-5537 represents a SQL Injection vulnerability discovered in halex CourseSEL versions 1.0.0 through 1.1.0. This flaw resides within the check_sel function of the HTTP GET Parameter Handler component, specifically in Apps/Index/Controller/IndexController.class.php. Successful exploitation allows remote attackers to inject malicious SQL code, potentially compromising the application's data integrity. A patch addressing this vulnerability is available.
A SQL injection vulnerability has been identified in halex CourseSEL up to version 1.1.0. The check_sel function within the file Apps/Index/Controller/IndexController.class.php is vulnerable due to manipulation of the seid parameter in HTTP GET requests. A remote attacker can exploit this vulnerability to execute malicious SQL code on the database, potentially leading to the disclosure, modification, or deletion of sensitive data. The vulnerability's severity is rated as CVSS 6.3, indicating a moderate risk. The vendor's lack of response to early disclosure of this public vulnerability exacerbates the situation, leaving users exposed to significant risk. Successful exploitation could compromise the integrity and confidentiality of data stored within the CourseSEL database.
The vulnerability is exploited through manipulation of the seid parameter in HTTP GET requests targeted at the check_sel function in Apps/Index/Controller/IndexController.class.php. The public disclosure of the exploit facilitates its use by attackers with varying levels of technical skill. The remote nature of the vulnerability means it can be exploited from anywhere with internet access. The vendor's lack of response indicates a potential lack of maintenance and support for the software, increasing the risk of continued exploitation. The vulnerability is particularly concerning for organizations using CourseSEL to manage sensitive student or course information.
Exploit Status
EPSS
0.03% (8% percentile)
CISA SSVC
CVSS Vector
Given the vendor's lack of a fix, immediate mitigation involves disabling or upgrading to a later version of halex CourseSEL that addresses this vulnerability. If upgrading is not possible, implementing additional security measures such as web application firewalls (WAFs) capable of detecting and blocking SQL injection attempts is recommended. Furthermore, rigorous validation and sanitization of all user inputs, especially GET parameters, is crucial to prevent the injection of malicious code. Actively monitoring server logs for suspicious SQL injection patterns can also aid in detecting and responding to potential attacks. Consider network segmentation to limit the potential impact of a security breach.
Actualice el módulo CourseSEL a una versión corregida que solucione la vulnerabilidad de inyección SQL en el parámetro seid. Contacte al proveedor para obtener información sobre las versiones corregidas, ya que no han respondido a las notificaciones de seguridad. Como medida preventiva, valide y escapa todas las entradas del usuario para evitar futuras inyecciones SQL.
Vulnerability analysis and critical alerts directly to your inbox.
SQL injection is an attack technique that allows attackers to insert malicious SQL code into a database query, potentially compromising the application's security.
An attacker could potentially access, modify, or delete sensitive data stored in the CourseSEL database.
Disabling or upgrading to a patched version of CourseSEL is the best course of action. If that's not possible, implement additional security measures like a WAF and input validation.
The vendor's lack of response is concerning and suggests a potential lack of maintenance for the software.
You can find more information about CVE-2026-5537 on vulnerability databases such as the National Vulnerability Database (NVD).
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.