SQL injection vulnerability (SQLi) in Clicldeu SaaS, specifically in the generation of reports, which occurs when a previously authenticated remote attacker executes a malicious payload in the URL generated after downloading the student's report card in the ‘Day-to-day’ section from the mobile application.

In the URL of the generated PDF, the session token used does not expire, so it remains valid for days after its generation, and unusual characters can be entered after the ‘id_alu’ parameter, resulting in two types of SQLi: boolean-based blind and time-based blind. Exploiting this vulnerability could allow an attacker to access confidential information in the database.
Advisories

No advisories yet.

Fixes

Solution

The vulnerability has been fixed by the Clickedu team in the integration of 26/01.


Workaround

No workaround given by the vendor.

History

Tue, 17 Feb 2026 12:00:00 +0000

Type Values Removed Values Added
Description SQL injection vulnerability (SQLi) in Clicldeu SaaS, specifically in the generation of reports, which occurs when a previously authenticated remote attacker executes a malicious payload in the URL generated after downloading the student's report card in the ‘Day-to-day’ section from the mobile application. In the URL of the generated PDF, the session token used does not expire, so it remains valid for days after its generation, and unusual characters can be entered after the ‘id_alu’ parameter, resulting in two types of SQLi: boolean-based blind and time-based blind. Exploiting this vulnerability could allow an attacker to access confidential information in the database.
Title SQL Injection in Clickedu's SaaS platform
First Time appeared Clickedu
Clickedu saas Platform
Weaknesses CWE-89
CPEs cpe:2.3:a:clickedu:saas_platform:all_versions:*:*:*:*:*:*:*
Vendors & Products Clickedu
Clickedu saas Platform
References
Metrics cvssV4_0

{'score': 8.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: INCIBE

Published:

Updated: 2026-02-17T11:35:50.058Z

Reserved: 2026-02-09T13:32:29.854Z

Link: CVE-2026-2247

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-02-17T12:16:15.443

Modified: 2026-02-17T12:16:15.443

Link: CVE-2026-2247

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses