A SQL Injection was found in the /exam/user/profile.php page of kashipara Online Exam System V1.0, which allows remote attackers to execute arbitrary SQL command to get unauthorized database access via the rname, rcollage, rnumber, rgender and rpassword parameters in a POST HTTP request.
References
| Link | Resource |
|---|---|
| https://github.com/0xBhushan/Writeups/blob/main/CVE/Kashipara/Online%20Exam%20System/SQL%20Injection-Profile%20Update.pdf | Exploit Third Party Advisory |
Configurations
History
16 Jan 2026, 17:31
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:jayesh:online_exam_system:1.0:*:*:*:*:*:*:* | |
| First Time |
Jayesh online Exam System
Jayesh |
|
| References | () https://github.com/0xBhushan/Writeups/blob/main/CVE/Kashipara/Online%20Exam%20System/SQL%20Injection-Profile%20Update.pdf - Exploit, Third Party Advisory |
12 Jan 2026, 21:15
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-89 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.1 |
12 Jan 2026, 20:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-12 20:15
Updated : 2026-01-16 17:31
NVD link : CVE-2025-51567
Mitre link : CVE-2025-51567
CVE.ORG link : CVE-2025-51567
JSON object : View
Products Affected
jayesh
- online_exam_system
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
