### [CVE-2023-5495](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5495) ![](https://img.shields.io/static/v1?label=Product&message=Smart%20School&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%206.4.1%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) ### Description A vulnerability was found in QDocs Smart School 6.4.1. It has been classified as critical. This affects an unknown part of the file /course/filterRecords/ of the component HTTP POST Request Handler. The manipulation of the argument searchdata[0][title]/searchdata[0][searchfield]/searchdata[0][searchvalue] leads to sql injection. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-241647. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. ### POC #### Reference - http://packetstormsecurity.com/files/175071/Smart-School-6.4.1-SQL-Injection.html #### Github No PoCs found on GitHub currently.