Writeup Exploits

60,534 exploits tracked across all sources.

Sort: Activity Stars
CVE-2026-26707 WRITEUP CRITICAL
Pharmacy Point of Sale System 1.0 - SQL Injection
sourcecodester Pharmacy Point of Sale System v1.0 is vulnerable to SQL Injection in /pharmacy/view_supplier.php.
CVSS 9.8
CVE-2026-26708 WRITEUP CRITICAL
Pharmacy Point of Sale System 1.0 - SQL Injection
sourcecodester Pharmacy Point of Sale System v1.0 is vulnerable to SQL Injection in /pharmacy/manage_user.php.
CVSS 9.8
CVE-2026-26709 WRITEUP CRITICAL
Simple Gym Management System 1.0 - SQL Injection
code-projects Simple Gym Management System v1.0 is vulnerable to SQL Injection in /gym/trainer_search.php.
CVSS 9.8
CVE-2026-26710 WRITEUP CRITICAL
Simple Food Order System 1.0 - SQL Injection
code-projects Simple Food Order System v1.0 is vulnerable to SQL Injection in /food/routers/edit-orders.php.
CVSS 9.8
CVE-2026-26711 WRITEUP CRITICAL
Simple Food Order System 1.0 - SQL Injection
code-projects Simple Food Order System v1.0 is vulnerable to SQL Injection in /food/view-ticket.php.
CVSS 9.8
CVE-2026-26712 WRITEUP CRITICAL
Simple Food Order System 1.0 - SQL Injection
code-projects Simple Food Order System v1.0 is vulnerable to SQL Injection in /food/view-ticket-admin.php.
CVSS 9.8
CVE-2026-26713 WRITEUP CRITICAL
Simple Food Order System 1.0 - SQL Injection
code-projects Simple Food Order System v1.0 is vulnerable to SQL Injection in /food/routers/cancel-order.php.
CVSS 9.8
CVE-2026-27631 WRITEUP MEDIUM
exiv2 < 0.28.8 - Denial of Service via Preview Command Line Argument
Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. Prior to version 0.28.8, an uncaught exception was found in Exiv2. The vulnerability is in the preview component, which is only triggered when running Exiv2 with an extra command line argument, like -pp. Due to an integer overflow, the code attempts to create a huge std::vector, which causes Exiv2 to crash with an uncaught exception. This issue has been patched in version 0.28.8.
CVSS 5.3
CVE-2024-50337 WRITEUP MEDIUM
Chamilo LMS < 1.11.28 - Unauthenticated Server-Side Request Forgery via OpenId Function
Chamilo is a learning management system. Prior to version 1.11.28, the OpenId function allows anyone to send requests to any URL on server's behalf, which results in unauthenticated blind SSRF. This issue has been patched in version 1.11.28.
CVSS 5.3
CVE-2025-50186 WRITEUP MEDIUM
Chamilo LMS < 1.11.30 - Stored Cross-Site Scripting via CSV Filename
Chamilo is a learning management system. Prior to version 1.11.30, a stored cross-site scripting (XSS) vulnerability exists due to insufficient sanitization of CSV filenames. An attacker can upload a maliciously named CSV file (e.g., <img src=q onerror=prompt(8)>.csv) that leads to JavaScript execution when viewed by administrators or users with access to import logs or file views. This issue has been patched in version 1.11.30.
CVSS 4.8
CVE-2025-50188 WRITEUP HIGH
Chamilo LMS < 1.11.30 - SQL Injection via GET Value Parameter
Chamilo is a learning management system. Prior to version 1.11.30, the application performs insufficient validation of data coming from the user from the GET value parameter with the following scripts: /plugin/vchamilo/views/syncparams.php and /plugin/vchamilo/ajax/service.php, which allows an attacker to perform an attack aimed at modifying the database query logic by injecting an arbitrary SQL statements. This issue has been patched in version 1.11.30.
CVSS 7.2
CVE-2025-50189 WRITEUP HIGH
Chamilo LMS < 1.11.30 - SQL Injection via POST resource[document] Parameter
Chamilo is a learning management system. Prior to version 1.11.30, the application performs insufficient validation of data coming from the user from the POST resource[document][SQL_INJECTION_HERE] and POST login parameters found in /main/coursecopy/copy_course_session_selected.php, which allows an attacker to perform an attack aimed at modifying the database query logic by injecting an arbitrary SQL statements. This issue has been patched in version 1.11.30.
CVSS 8.8
CVE-2025-50190 WRITEUP CRITICAL
Chamilo < 1.11.30 - SQL Injection via GET openid.assoc_handle Parameter
Chamilo is a learning management system. Prior to version 1.11.30, there is an error-based SQL Injection via the GET openid.assoc_handle parameter with the /index.php script. This issue has been patched in version 1.11.30.
CVSS 9.8
CVE-2025-50191 WRITEUP HIGH
Chamilo < 1.11.30 - SQL Injection via POST userFile in hotpotatoes.php
Chamilo is a learning management system. Prior to version 1.11.30, there is an error-based SQL Injection via POST userFile with the /main/exercise/hotpotatoes.php script. This issue has been patched in version 1.11.30.
CVSS 7.2
CVE-2025-50192 WRITEUP CRITICAL
Chamilo < 1.11.30 - Time-Based SQL Injection via Registration SOAP Endpoint
Chamilo is a learning management system. Prior to version 1.11.30, there is a time-based SQL Injection in found in /main/webservices/registration.soap.php. This issue has been patched in version 1.11.30.
CVSS 9.8
CVE-2025-50193 WRITEUP HIGH
Chamilo <1.11.30 - Command Injection
Chamilo is a learning management system. Prior to version 1.11.30, there is an OS command Injection vulnerability in /plugin/vchamilo/views/import.php with the POST to_main_database parameter. This issue has been patched in version 1.11.30.
CVSS 7.2
CVE-2025-50194 WRITEUP HIGH
Chamilo <1.11.30 - Command Injection
Chamilo is a learning management system. Prior to version 1.11.30, there is an OS Command Injection vulnerability in /main/cron/lang/check_parse_lang.php. This issue has been patched in version 1.11.30.
CVSS 7.2
CVE-2025-50195 WRITEUP HIGH
Chamilo <1.11.30 - Command Injection
Chamilo is a learning management system. Prior to version 1.11.30, there is an OS Command Injection vulnerability in /plugin/vchamilo/views/manage.controller.php. This issue has been patched in version 1.11.30.
CVSS 7.2
CVE-2025-50196 WRITEUP HIGH
Chamilo <1.11.30 - Command Injection
Chamilo is a learning management system. Prior to version 1.11.30, there is an OS Command Injection vulnerability in /plugin/vchamilo/views/editinstance.php via the POST main_database parameter. This issue has been patched in version 1.11.30.
CVSS 7.2
CVE-2025-50197 WRITEUP HIGH
Chamilo <1.11.30 - Command Injection
Chamilo is a learning management system. Prior to version 1.11.30, there is an OS Command Injection vulnerability in /main/admin/sub_language_ajax.inc.php via the POST new_language parameter. This issue has been patched in version 1.11.30.
CVSS 7.2
CVE-2025-50198 WRITEUP MEDIUM
Chamilo < 1.11.30 - Deserialization of Untrusted Data via Import Configuration Parameters
Chamilo is a learning management system. Prior to version 1.11.30, Chamilo is vulnerable to deserialization of untrusted data in /plugin/vchamilo/views/import.php via POST configuration_file; POST course_path; POST home_path parameters. This issue has been patched in version 1.11.30.
CVSS 4.9
CVE-2025-52468 WRITEUP HIGH
Chamilo LMS < 1.11.30 - Stored Cross-Site Scripting via CSV User Import
Chamilo is a learning management system. Prior to version 1.11.30, an input validation vulnerability exists when importing user data from CSV files. This flaw occurs due to insufficient sanitization of user data, specifically in the "Last Name", "First Name", and "Username" fields. It allows attackers to inject a stored cross-site scripting (XSS) payload that is triggered when the user profile is viewed, potentially leading to malicious script execution in the context of the authenticated use. This issue has been patched in version 1.11.30.
CVSS 8.8
CVE-2025-52469 WRITEUP HIGH
Chamilo <1.11.30 - Privilege Escalation
Chamilo is a learning management system. Prior to version 1.11.30, a logic vulnerability in the friend request workflow of Chamilo’s social network module allows an authenticated user to forcibly add any user as a friend by directly calling the AJAX endpoint. The attacker can bypass the normal flow of sending and accepting friend requests, and even add non-existent users. This breaks access control and social interaction logic, with potential privacy implications. This issue has been patched in version 1.11.30.
CVSS 7.1
CVE-2025-52470 WRITEUP MEDIUM
Chamilo LMS < 1.11.30 - Stored Cross-Site Scripting via Category Name Field
Chamilo is a learning management system. Prior to version 1.11.30, a stored cross-site scripting (XSS) vulnerability exists in the session_category_add.php script. The vulnerability is caused by improper sanitization of the Category Name field, allowing privileged users to inject persistent JavaScript payloads. The injected script is later executed when accessing add_many_sessions_to_category.php, potentially compromising administrative sessions. This issue has been patched in version 1.11.30.
CVSS 4.8
CVE-2025-52475 WRITEUP MEDIUM
Chamilo LMS < 1.11.30 - Reflected Cross-Site Scripting via keyword_inactive Parameter
Chamilo is a learning management system. Prior to version 1.11.30, there is a reflected cross-site scripting (XSS) vulnerability in the admin/user_list.php endpoint. The keyword_inactive parameter is not properly sanitized, allowing attackers to inject malicious JavaScript through a crafted URL. This issue has been patched in version 1.11.30.
CVSS 6.1