{"id":"CVE-2021-44427","details":"An unauthenticated SQL Injection vulnerability in Rosario Student Information System (aka rosariosis) before 8.1.1 allows remote attackers to execute PostgreSQL statements (e.g., SELECT, INSERT, UPDATE, and DELETE) through /Side.php via the syear parameter.","aliases":["GHSA-wf5p-f5xr-c4jj"],"modified":"2026-04-09T08:20:35.262369Z","published":"2021-11-29T22:15:07.533Z","references":[{"type":"REPORT","url":"https://gitlab.com/francoisjacquet/rosariosis/-/issues/328"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://gitlab.com/francoisjacquet/rosariosis","events":[{"introduced":"0"},{"fixed":"c0290c737a9c0c93403f70b5e0086516460d1289"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"8.1.1"}]}}],"versions":["2.9.8","5.0-beta","v1.2","v1.2.1","v1.2.2","v1.3","v1.3.1","v1.3.2","v2.0","v2.0.1","v2.0.2","v2.0.3","v2.0b","v2.0b.2","v2.0b.3","v2.0b3","v2.0b4","v2.1","v2.1.1","v2.2","v2.2.1","v2.2.2","v2.2.3","v2.2.4","v2.2.5","v2.3","v2.3.1","v2.3.2","v2.3.3","v2.3.4","v2.4","v2.4.1","v2.5","v2.5.1","v2.5.2","v2.5.3","v2.5.3b","v2.5.4","v2.5.5","v2.5.6","v2.5.7","v2.5.8","v2.6","v2.6.1","v2.6.2","v2.6.3","v2.6.4","v2.6.5","v2.6.6","v2.7","v2.7-beta","v2.7.1","v2.7.2","v2.7.3","v2.8","v2.8-beta","v2.8-beta2","v2.8-beta3","v2.8-beta4","v2.8.1","v2.8.10","v2.8.11","v2.8.12","v2.8.13","v2.8.14","v2.8.15","v2.8.16","v2.8.17","v2.8.18","v2.8.19","v2.8.2","v2.8.20","v2.8.20bis","v2.8.21","v2.8.22","v2.8.23","v2.8.24","v2.8.25","v2.8.26","v2.8.27","v2.8.3","v2.8.3bis","v2.8.4","v2.8.5","v2.8.6","v2.8.7","v2.8.8","v2.8.9","v2.9","v2.9.1","v2.9.10","v2.9.11","v2.9.12","v2.9.13","v2.9.14","v2.9.15","v2.9.2","v2.9.3","v2.9.4","v2.9.5","v2.9.6","v2.9.8","v2.9.9","v3.0","v3.0.1","v3.0.2","v3.1","v3.1.1","v3.1.2","v3.2","v3.3","v3.3-beta","v3.3.1","v3.3.2","v3.3.3","v3.3.4","v3.4","v3.4.1","v3.4.2","v3.4.3","v3.5","v3.5.1","v3.5.2","v3.5.3","v3.6","v3.6-beta","v3.6.1","v3.7","v3.7-beta","v3.7.1","v3.8","v3.8-beta","v3.8-beta2","v3.9","v3.9-beta","v3.9.1","v4.0","v4.0-beta","v4.0-beta2","v4.0-beta3","v4.1","v4.2-beta","v4.3","v4.3-beta","v4.3.1","v4.4","v4.4-beta","v4.4-beta2","v4.5","v4.5-beta2","v4.5.1","v4.6","v4.6-beta","v4.7-beta2","v4.8-beta","v4.8-beta2","v4.9","v4.9-beta","v4.9.1","v5.0","v5.0-beta2","v5.0-beta3","v5.0-beta4","v5.0.1","v5.0.2","v5.0.3","v5.0.4","v5.0.5","v5.1","v5.1-beta","v5.1.1","v5.2","v5.2-beta","v5.3","v5.3-beta","v5.4","v5.4-beta","v5.4.1","v5.4.2","v5.5","v5.5-beta","v5.5-beta2","v5.5-beta3","v5.5.1","v5.6","v5.6-beta","v5.6.1","v5.6.2","v5.6.3","v5.6.4","v5.6.5","v5.7","v5.7.1","v5.7.2","v5.7.3","v5.8","v5.8-beta","v5.8-beta2","v5.8-beta3","v5.8-beta4","v5.8-beta5","v5.9","v5.9-beta2","v5.9-beta3","v6.0","v6.0-beta","v6.1","v6.2","v6.3","v6.4","v6.4.1","v6.4.2","v6.5","v6.5.1","v6.5.2","v6.6","v6.6.1","v6.7","v6.7.1","v6.7.2","v6.8","v6.8-beta","v6.9","v6.9-beta","v6.9.1","v6.9.2","v6.9.3","v7.0","v7.0-beta","v7.0.1","v7.0.2","v7.0.3","v7.1","v7.1.1","v7.1.2","v7.2","v7.2.1","v7.2.2","v7.3","v7.3.1","v7.4","v7.5","v7.6","v7.6.1","v7.7","v7.8","v7.8.1","v7.8.2","v7.8.3","v7.8.4","v7.9","v7.9.1","v8.0","v8.0.1","v8.1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-44427.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}