CVE-2026-26695
Published: 02 March 2026
Summary
CVE-2026-26695 is a critical-severity SQL Injection (CWE-89) vulnerability in Carmelo Simple Student Alumni System. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 15.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly and comprehensively mitigates SQL injection by validating user inputs to the /TracerStudy/recordstudent_edit.php endpoint before database processing.
Requires timely remediation of the specific SQL injection flaw identified in CVE-2026-26695 through patching or code correction.
Vulnerability scanning identifies SQL injection vulnerabilities like this CVE and drives their remediation to prevent exploitation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection vulnerability in a publicly accessible PHP web application component (/TracerStudy/recordstudent_edit.php) allows unauthenticated remote attackers to execute arbitrary SQL commands against the backend database, directly enabling T1190 Exploit Public-Facing Application.
NVD Description
code-projects Simple Student Alumni System v1.0 is vulnerable to SQL Injection in /TracerStudy/recordstudent_edit.php.
Deeper analysisAI
CVE-2026-26695 is a SQL injection vulnerability (CWE-89) in code-projects Simple Student Alumni System version 1.0, specifically affecting the /TracerStudy/recordstudent_edit.php component. Published on 2026-03-02, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), marking it as critical due to its potential for severe impact.
Remote attackers require no authentication or privileges and can exploit the vulnerability over the network with low attack complexity and no user interaction. Successful exploitation enables high-impact compromise of confidentiality, integrity, and availability, allowing arbitrary SQL command execution against the backend database.
Advisories reference a GitHub bug report at https://github.com/Thirtypenny77/bug_report/blob/main/code-projects/simple-student-alumni-system/SQL-2.md for further details, though no specific patches or mitigations are detailed in the CVE information.
Details
- CWE(s)