Skip to main content

CVE-2025-10076: SQL Injection in SourceCodester Online Polling System

Medium
VulnerabilityCVE-2025-10076cvecve-2025-10076
Published: Mon Sep 08 2025 (09/08/2025, 01:02:07 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: Online Polling System

Description

A weakness has been identified in SourceCodester Online Polling System 1.0. This affects an unknown function of the file /manage-profile.php. This manipulation of the argument email causes sql injection. The attack may be initiated remotely. The exploit has been made available to the public and could be exploited.

AI-Powered Analysis

AILast updated: 09/08/2025, 01:33:11 UTC

Technical Analysis

CVE-2025-10076 is a SQL Injection vulnerability identified in SourceCodester Online Polling System version 1.0, specifically within the /manage-profile.php file. The vulnerability arises from improper sanitization or validation of the 'email' parameter, which can be manipulated by an attacker to inject malicious SQL code. This injection flaw allows remote attackers to execute arbitrary SQL commands on the backend database without requiring authentication or user interaction. The CVSS 4.0 base score is 6.9 (medium severity), reflecting that the attack vector is network-based (AV:N), requires no privileges (PR:N), and no user interaction (UI:N). The impact on confidentiality, integrity, and availability is limited but present (VC:L, VI:L, VA:L), indicating partial compromise potential. The vulnerability does not affect system components beyond the database scope (SC:N), and the exploitability is rated as probable (E:P). Although no public exploit is currently known to be actively used in the wild, the exploit code has been made publicly available, increasing the risk of exploitation. The vulnerability could allow attackers to extract sensitive data, modify or delete records, or disrupt polling system operations, which could undermine the integrity and trustworthiness of polling results. Since the affected product is an online polling system, the impact extends to data integrity and availability of polling services, potentially affecting decision-making processes relying on these polls.

Potential Impact

For European organizations using SourceCodester Online Polling System 1.0, this vulnerability poses a significant risk to the confidentiality and integrity of polling data. Attackers exploiting this flaw could manipulate poll results, leading to misinformation or skewed data that could affect public opinion analysis, market research, or internal decision-making. The availability of the polling system could also be disrupted, causing service outages or denial of service. Given the medium severity and the lack of authentication requirements, attackers can remotely exploit this vulnerability without needing credentials, increasing the attack surface. Organizations involved in political polling, public opinion research, or customer feedback collection in Europe could face reputational damage, regulatory scrutiny under GDPR if personal data is exposed, and operational disruptions. The risk is heightened for entities that rely heavily on the integrity of polling data for compliance, strategic decisions, or public communication.

Mitigation Recommendations

To mitigate CVE-2025-10076, organizations should immediately review and sanitize all inputs, especially the 'email' parameter in /manage-profile.php, using parameterized queries or prepared statements to prevent SQL injection. Since no official patch is currently available, applying a Web Application Firewall (WAF) with custom rules to detect and block SQL injection patterns targeting the vulnerable endpoint is recommended. Conduct thorough code audits to identify similar injection points in the application. Restrict database user permissions to the minimum necessary to limit the impact of potential exploitation. Monitor logs for suspicious activities related to SQL injection attempts. If feasible, isolate the polling system from critical internal networks and restrict access to trusted IP addresses. Organizations should also plan for an upgrade or replacement of the vulnerable software version once a patch is released. Regular backups of polling data should be maintained to enable recovery in case of data tampering or loss.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-07T11:48:48.192Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68be2edfe3f0bafba8aac59c

Added to database: 9/8/2025, 1:18:23 AM

Last enriched: 9/8/2025, 1:33:11 AM

Last updated: 9/8/2025, 7:13:20 AM

Views: 5

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats