CVE-2025-10076: SQL Injection in SourceCodester Online Polling System
A weakness has been identified in SourceCodester Online Polling System 1.0. This affects an unknown function of the file /manage-profile.php. This manipulation of the argument email causes sql injection. The attack may be initiated remotely. The exploit has been made available to the public and could be exploited.
AI Analysis
Technical Summary
CVE-2025-10076 is a SQL Injection vulnerability identified in SourceCodester Online Polling System version 1.0, specifically within the /manage-profile.php file. The vulnerability arises from improper sanitization or validation of the 'email' parameter, which can be manipulated by an attacker to inject malicious SQL code. This injection flaw allows remote attackers to execute arbitrary SQL commands on the backend database without requiring authentication or user interaction. The CVSS 4.0 base score is 6.9 (medium severity), reflecting that the attack vector is network-based (AV:N), requires no privileges (PR:N), and no user interaction (UI:N). The impact on confidentiality, integrity, and availability is limited but present (VC:L, VI:L, VA:L), indicating partial compromise potential. The vulnerability does not affect system components beyond the database scope (SC:N), and the exploitability is rated as probable (E:P). Although no public exploit is currently known to be actively used in the wild, the exploit code has been made publicly available, increasing the risk of exploitation. The vulnerability could allow attackers to extract sensitive data, modify or delete records, or disrupt polling system operations, which could undermine the integrity and trustworthiness of polling results. Since the affected product is an online polling system, the impact extends to data integrity and availability of polling services, potentially affecting decision-making processes relying on these polls.
Potential Impact
For European organizations using SourceCodester Online Polling System 1.0, this vulnerability poses a significant risk to the confidentiality and integrity of polling data. Attackers exploiting this flaw could manipulate poll results, leading to misinformation or skewed data that could affect public opinion analysis, market research, or internal decision-making. The availability of the polling system could also be disrupted, causing service outages or denial of service. Given the medium severity and the lack of authentication requirements, attackers can remotely exploit this vulnerability without needing credentials, increasing the attack surface. Organizations involved in political polling, public opinion research, or customer feedback collection in Europe could face reputational damage, regulatory scrutiny under GDPR if personal data is exposed, and operational disruptions. The risk is heightened for entities that rely heavily on the integrity of polling data for compliance, strategic decisions, or public communication.
Mitigation Recommendations
To mitigate CVE-2025-10076, organizations should immediately review and sanitize all inputs, especially the 'email' parameter in /manage-profile.php, using parameterized queries or prepared statements to prevent SQL injection. Since no official patch is currently available, applying a Web Application Firewall (WAF) with custom rules to detect and block SQL injection patterns targeting the vulnerable endpoint is recommended. Conduct thorough code audits to identify similar injection points in the application. Restrict database user permissions to the minimum necessary to limit the impact of potential exploitation. Monitor logs for suspicious activities related to SQL injection attempts. If feasible, isolate the polling system from critical internal networks and restrict access to trusted IP addresses. Organizations should also plan for an upgrade or replacement of the vulnerable software version once a patch is released. Regular backups of polling data should be maintained to enable recovery in case of data tampering or loss.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland, Sweden
CVE-2025-10076: SQL Injection in SourceCodester Online Polling System
Description
A weakness has been identified in SourceCodester Online Polling System 1.0. This affects an unknown function of the file /manage-profile.php. This manipulation of the argument email causes sql injection. The attack may be initiated remotely. The exploit has been made available to the public and could be exploited.
AI-Powered Analysis
Technical Analysis
CVE-2025-10076 is a SQL Injection vulnerability identified in SourceCodester Online Polling System version 1.0, specifically within the /manage-profile.php file. The vulnerability arises from improper sanitization or validation of the 'email' parameter, which can be manipulated by an attacker to inject malicious SQL code. This injection flaw allows remote attackers to execute arbitrary SQL commands on the backend database without requiring authentication or user interaction. The CVSS 4.0 base score is 6.9 (medium severity), reflecting that the attack vector is network-based (AV:N), requires no privileges (PR:N), and no user interaction (UI:N). The impact on confidentiality, integrity, and availability is limited but present (VC:L, VI:L, VA:L), indicating partial compromise potential. The vulnerability does not affect system components beyond the database scope (SC:N), and the exploitability is rated as probable (E:P). Although no public exploit is currently known to be actively used in the wild, the exploit code has been made publicly available, increasing the risk of exploitation. The vulnerability could allow attackers to extract sensitive data, modify or delete records, or disrupt polling system operations, which could undermine the integrity and trustworthiness of polling results. Since the affected product is an online polling system, the impact extends to data integrity and availability of polling services, potentially affecting decision-making processes relying on these polls.
Potential Impact
For European organizations using SourceCodester Online Polling System 1.0, this vulnerability poses a significant risk to the confidentiality and integrity of polling data. Attackers exploiting this flaw could manipulate poll results, leading to misinformation or skewed data that could affect public opinion analysis, market research, or internal decision-making. The availability of the polling system could also be disrupted, causing service outages or denial of service. Given the medium severity and the lack of authentication requirements, attackers can remotely exploit this vulnerability without needing credentials, increasing the attack surface. Organizations involved in political polling, public opinion research, or customer feedback collection in Europe could face reputational damage, regulatory scrutiny under GDPR if personal data is exposed, and operational disruptions. The risk is heightened for entities that rely heavily on the integrity of polling data for compliance, strategic decisions, or public communication.
Mitigation Recommendations
To mitigate CVE-2025-10076, organizations should immediately review and sanitize all inputs, especially the 'email' parameter in /manage-profile.php, using parameterized queries or prepared statements to prevent SQL injection. Since no official patch is currently available, applying a Web Application Firewall (WAF) with custom rules to detect and block SQL injection patterns targeting the vulnerable endpoint is recommended. Conduct thorough code audits to identify similar injection points in the application. Restrict database user permissions to the minimum necessary to limit the impact of potential exploitation. Monitor logs for suspicious activities related to SQL injection attempts. If feasible, isolate the polling system from critical internal networks and restrict access to trusted IP addresses. Organizations should also plan for an upgrade or replacement of the vulnerable software version once a patch is released. Regular backups of polling data should be maintained to enable recovery in case of data tampering or loss.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-07T11:48:48.192Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68be2edfe3f0bafba8aac59c
Added to database: 9/8/2025, 1:18:23 AM
Last enriched: 9/8/2025, 1:33:11 AM
Last updated: 9/8/2025, 7:13:20 AM
Views: 5
Related Threats
CVE-2025-5993: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in ITCube Software ITCube CRM
CriticalCVE-2025-10090: SQL Injection in Jinher OA
MediumCVE-2025-58782: CWE-502 Deserialization of Untrusted Data in Apache Software Foundation Apache Jackrabbit Core
CriticalCVE-2025-10088: Cross Site Scripting in SourceCodester Time Tracker
MediumCVE-2025-41708: CWE-319 Cleartext Transmission of Sensitive Information in Bender CC612
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.