CVE-2026-6488 PUBLISHED

QueryMine sms GET Request Parameter editcourse.php sql injection

Assigner: VulDB
Reserved: 17.04.2026 Published: 17.04.2026 Updated: 17.04.2026

A vulnerability was identified in QueryMine sms up to 7ab5a9ea196209611134525ffc18de25c57d9593. This vulnerability affects unknown code of the file admin/editcourse.php of the component GET Request Parameter Handler. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit is publicly available and might be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
CVSS Score: 5.3

Product Status

Vendor QueryMine
Product sms
Versions
  • Version 7ab5a9ea196209611134525ffc18de25c57d9593 is affected

Credits

  • yanxiao (VulDB User) reporter
  • VulDB CNA Team coordinator

References

Problem Types

  • SQL Injection CWE
  • Injection CWE