SQL Injection Vulnerability in QueryMine SMS Product by Unknown Vendor
CVE-2026-6490

6.9MEDIUM

Key Information:

Vendor

Querymine

Status
Vendor
CVE Published:
17 April 2026

Badges

๐Ÿ‘พ Exploit Exists๐ŸŸก Public PoC

What is CVE-2026-6490?

A SQL injection vulnerability exists in the QueryMine sms component, specifically within the admin/deletecourse.php file. This issue arises due to improper handling of the GET request parameter 'ID', allowing attackers to manipulate the input and execute unauthorized SQL queries. The attack can be initiated remotely, exposing the system to risks of data compromise and unauthorized data modification. As the product follows a rolling release model, specific version information is unavailable, and attempts to notify the vendor have gone unanswered.

Affected Version(s)

sms 7ab5a9ea196209611134525ffc18de25c57d9593

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
6.9
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • ๐ŸŸก

    Public PoC available

  • ๐Ÿ‘พ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

lzz0403 (VulDB User)
VulDB CNA Team
.