{"id":"CVE-2021-40543","details":"Opensis-Classic Version 8.0 is affected by a SQL injection vulnerability due to a lack of sanitization of input data at two parameters $_GET['usrid'] and $_GET['prof_id'] in the PasswordCheck.php file.","modified":"2026-04-10T04:37:58.018342Z","published":"2021-10-11T13:15:07.457Z","references":[{"type":"REPORT","url":"https://github.com/OS4ED/openSIS-Classic/issues/191"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/os4ed/opensis-responsive-design","events":[{"introduced":"0"},{"last_affected":"0a2d61fff35900fc91566e6621d49959599bcb4e"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"8.0"}]}}],"versions":["V7.5","V7.6","V8.0","Ver7.0Prod_update","Ver7.0beta1","v7.1","v7.2","v7.3","ver7.1","ver7.4"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-40543.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}