SQL Injection Flaw in QueryMine SMS: Remote Exploitation Possible

SQL Injection Flaw in QueryMine SMS: Remote Exploitation Possible

The National Vulnerability Database has disclosed CVE-2026-6490, a critical SQL injection vulnerability affecting QueryMine SMS. This flaw resides in the admin/deletecourse.php file, allowing remote attackers to manipulate the ID GET request parameter. Successful exploitation could lead to unauthorized data access or modification by injecting malicious SQL code.

The National Vulnerability Database notes that the specific version of QueryMine SMS affected is not detailed due to its rolling release model. However, the vulnerability, rated HIGH with a CVSS score of 7.3, is publicly known and exploitable. The vendor was contacted but failed to respond, leaving users exposed.

Defenders should assume any deployment of QueryMine SMS is at risk. Given the lack of specific versioning and vendor engagement, proactive measures are paramount. Audit systems for unusual database queries originating from the web application and consider network segmentation to limit the blast radius if an incident occurs.

What This Means For You

  • If your organization uses QueryMine SMS, you must immediately investigate potential exploitation. Audit your database logs for any suspicious queries targeting the `ID` parameter in the `admin/deletecourse.php` script. Given the remote, unauthenticated nature of this attack, assume compromise is possible and prepare incident response procedures.

Related ATT&CK Techniques

🛡️ Detection Rules

7 rules · 6 SIEM formats

7 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

high T1190 Initial Access

Web Application Exploitation Attempt — CVE-2026-6490

Sigma YAML — free preview
✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Export via Bot →

Indicators of Compromise

IDTypeIndicator
CVE-2026-6490 SQLi QueryMine sms up to commit 7ab5a9ea196209611134525ffc18de25c57d9593
CVE-2026-6490 SQLi admin/deletecourse.php via GET Request Parameter 'ID'
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedApril 17, 2026 at 17:16 UTC

This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.

Believe this infringes your rights? Submit a takedown request.

Related Posts

CVE-2026-6496 — Prasathmani TinyFileManager Path Traversal

CVE-2026-6496 — A vulnerability was found in prasathmani TinyFileManager up to 2.6. Affected is an unknown function of the file /filemanager.php of the component POST...

vulnerabilityCVEmedium-severitypath-traversalcwe-22
/SCW Vulnerability Desk /MEDIUM /⚑ 2 IOCs /⚙ 7 Sigma

CVE-2026-41153 — In JetBrains Junie before 252.549.29 command execution was

CVE-2026-41153 — In JetBrains Junie before 252.549.29 command execution was possible via malicious project file

vulnerabilityCVEmedium-severitycwe-77
/SCW Vulnerability Desk /MEDIUM /⚑ 2 IOCs /⚙ 2 Sigma

CVE-2026-6492 — Arnobt78 Hotel Booking Management System Information Disclosure

CVE-2026-6492 — A vulnerability was detected in arnobt78 Hotel Booking Management System up to f8922d0e0f6ac1cc761974c7616f44c2bbc04bea. The impacted element is an unknown function of the file...

vulnerabilityCVEmedium-severityinformation-disclosurecwe-200cwe-284
/SCW Vulnerability Desk /MEDIUM /⚑ 3 IOCs /⚙ 4 Sigma