CVE-2025-14566

A security flaw has been discovered in kidaze CourseSelectionSystem up to 42cd892b40a18d50bd4ed1905fa89f939173a464. The impacted element is an unknown function of the file /Profilers/SProfile/reg.php. Performing a manipulation of the argument USN results in sql injection. It is possible to initiate the attack remotely. The exploit has been released to the public and may be used for attacks.
References
Link Resource
https://github.com/Anti1i/cve/issues/2 Exploit Issue Tracking Third Party Advisory
https://vuldb.com/?ctiid.336190 Permissions Required VDB Entry
https://vuldb.com/?id.336190 Third Party Advisory VDB Entry
https://vuldb.com/?submit.703876 Third Party Advisory VDB Entry
https://vuldb.com/?submit.704951 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:kidaze:courseselectionsystem:*:*:*:*:*:*:*:*

History

24 Feb 2026, 06:16

Type Values Removed Values Added
Summary (en) A security flaw has been discovered in kidaze CourseSelectionSystem up to 42cd892b40a18d50bd4ed1905fa89f939173a464. The impacted element is an unknown function of the file /Profilers/SProfile/reg.php. Performing manipulation of the argument USN results in sql injection. It is possible to initiate the attack remotely. The exploit has been released to the public and may be exploited. (en) A security flaw has been discovered in kidaze CourseSelectionSystem up to 42cd892b40a18d50bd4ed1905fa89f939173a464. The impacted element is an unknown function of the file /Profilers/SProfile/reg.php. Performing a manipulation of the argument USN results in sql injection. It is possible to initiate the attack remotely. The exploit has been released to the public and may be used for attacks.
References () https://github.com/Anti1i/cve/issues/2 - Exploit, Third Party Advisory, Issue Tracking () https://github.com/Anti1i/cve/issues/2 - Exploit, Issue Tracking, Third Party Advisory

19 Dec 2025, 19:57

Type Values Removed Values Added
First Time Kidaze
Kidaze courseselectionsystem
References () https://github.com/Anti1i/cve/issues/2 - () https://github.com/Anti1i/cve/issues/2 - Exploit, Third Party Advisory, Issue Tracking
References () https://vuldb.com/?ctiid.336190 - () https://vuldb.com/?ctiid.336190 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.336190 - () https://vuldb.com/?id.336190 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.703876 - () https://vuldb.com/?submit.703876 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.704951 - () https://vuldb.com/?submit.704951 - Third Party Advisory, VDB Entry
CPE cpe:2.3:a:kidaze:courseselectionsystem:*:*:*:*:*:*:*:*

12 Dec 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-12 16:15

Updated : 2026-02-24 06:16


NVD link : CVE-2025-14566

Mitre link : CVE-2025-14566

CVE.ORG link : CVE-2025-14566


JSON object : View

Products Affected

kidaze

  • courseselectionsystem
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')