Skip to content

CVE-2026-6595: SQL Injection in School Management System

A critical SQL injection vulnerability has been identified in the ProjectsAndPrograms School Management System, tracked as CVE-2026-6595. This vulnerability allows an unauthenticated remote attacker to execute arbitrary SQL commands by manipulating the bus_id parameter. Analysis confirms that the flaw originates from improper input handling in the buslocation.php file.

The vulnerability exists within the student_panel/buslocation.php file, specifically at line 54. The application processes the bus_id GET parameter without any sanitization or parameterization.

The vulnerable code structure is as follows: $sql = "SELECT * FROM bus_root WHERE bus_id='{$_GET['bus_id']}'";

By injecting SQL syntax into the bus_id parameter, an attacker can manipulate the query structure. An example payload includes ' union select 1,2,database(),4,5-- , which forces the application to return the database name in the response.

Three primary forensic markers for this exploitation attempt have been identified.

  1. Access Logs: Presence of GET requests to /student_panel/buslocation.php containing SQL injection characters, such as union, select, or comment indicators (--).
  2. Database Logs: Anomalous queries originating from the application database user containing UNION SELECT statements or metadata extraction functions.
  3. Application Logs: An increase in 500 server error codes or database syntax error logs, often associated with failed attempts to bypass query logic.
title: Potential SQL Injection in School Management System
status: experimental
description: Detects exploitation attempts of CVE-2026-6595 against buslocation.php
logsource:
category: web
detection:
selection:
uri_query|contains: 'bus_id='
uri_query|contains:
- 'union'
- 'select'
- 'database()'
- '--'
condition: selection
priority: high