Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-8207
PUBLISHED
More InfoOfficial Page
Assigner-PRJBLK
Assigner Org ID-ab69c47f-b95e-4bf2-b2d9-4b1fd1b24b4a
View Known Exploited Vulnerability (KEV) details
Published At-09 May, 2026 | 02:41
Updated At-09 May, 2026 | 02:41
Rejected At-
▼CVE Numbering Authority (CNA)

Gibbon versions before v30.0.01 are affected by an authenticated SQL Injection vulnerability by abusing the Tracking/graphing https://github.com/GibbonEdu/core/blob/c431e25fdc874adece5d2dc7e408e9aa2d1abadb/modules/Tracking/graphing.php#L145 feature. Successful exploitation requires Teacher or higher privileges. Exploitation could result in unintended read/write activities to the underlying database.

Affected Products
Vendor
gibbonedu
Product
gibbon
Default Status
unaffected
Versions
Affected
  • From 0 before 30.0.01 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-89CWE-89 Improper neutralization of special elements used in an SQL command ('SQL injection')
Type: CWE
CWE ID: CWE-89
Description: CWE-89 Improper neutralization of special elements used in an SQL command ('SQL injection')
Metrics
VersionBase scoreBase severityVector
4.07.0HIGH
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N
Version: 4.0
Base score: 7.0
Base severity: HIGH
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N
Metrics Other Info
Impacts
CAPEC IDDescription
CAPEC-66CAPEC-66 SQL Injection
CAPEC ID: CAPEC-66
Description: CAPEC-66 SQL Injection
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://projectblack.io/blog/gibbon-v30-authenticated-sql-injection-and-rce/#sql-injectiongetting-warmed-up
exploit
https://github.com/GibbonEdu/core/releases/tag/v30.0.01
vendor-advisory
Hyperlink: https://projectblack.io/blog/gibbon-v30-authenticated-sql-injection-and-rce/#sql-injectiongetting-warmed-up
Resource:
exploit
Hyperlink: https://github.com/GibbonEdu/core/releases/tag/v30.0.01
Resource:
vendor-advisory
Details not found