CVE-2025-10077: SQL Injection in SourceCodester Online Polling System
A security vulnerability has been detected in SourceCodester Online Polling System 1.0. This impacts an unknown function of the file /registeracc.php. Such manipulation of the argument email leads to sql injection. The attack may be launched remotely. The exploit has been disclosed publicly and may be used.
AI Analysis
Technical Summary
CVE-2025-10077 is a SQL Injection vulnerability identified in SourceCodester Online Polling System version 1.0. The vulnerability resides in the /registeracc.php file, specifically in the handling of the 'email' parameter. An attacker can manipulate this parameter to inject arbitrary SQL commands into the backend database query. This injection flaw allows an unauthenticated remote attacker to execute unauthorized SQL queries without any user interaction or privileges. The vulnerability is exploitable over the network (AV:N), requires low attack complexity (AC:L), and does not require authentication (PR:N) or user interaction (UI:N). The impact on confidentiality, integrity, and availability is limited but present (VC:L, VI:L, VA:L), indicating partial compromise potential. The vulnerability has been publicly disclosed but no known exploits are currently observed in the wild. The CVSS v4.0 base score is 6.9, categorizing it as a medium severity issue. Exploitation could lead to unauthorized data access, data modification, or disruption of polling system functionality, potentially undermining the integrity of polling results and user data. The lack of patches or mitigation guidance from the vendor increases the risk for users of this software version.
Potential Impact
For European organizations using SourceCodester Online Polling System 1.0, this vulnerability poses a risk to the confidentiality and integrity of polling data and user information. Exploitation could allow attackers to extract sensitive data such as user emails or manipulate polling results, which can affect decision-making processes, public opinion analysis, or internal organizational surveys. This is particularly critical for public sector entities, political organizations, or companies relying on polling data for strategic decisions. Additionally, data breaches involving personal information may lead to GDPR violations, resulting in legal and financial penalties. The availability impact is limited but could cause temporary disruption of polling services, affecting user trust and operational continuity. Since the vulnerability is remotely exploitable without authentication, attackers can target exposed systems over the internet, increasing the attack surface for European organizations with public-facing polling platforms.
Mitigation Recommendations
Organizations should immediately audit their use of SourceCodester Online Polling System version 1.0 and identify any exposed instances of /registeracc.php. Given the absence of official patches, mitigation should focus on implementing web application firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'email' parameter. Input validation and parameterized queries should be enforced if source code access is available, replacing vulnerable SQL query constructions. Network-level restrictions should be applied to limit access to the polling system to trusted IP ranges where feasible. Regular monitoring of logs for suspicious SQL syntax or unusual query patterns is recommended to detect exploitation attempts. Organizations should also consider migrating to updated or alternative polling solutions with secure coding practices. Finally, ensure compliance with GDPR by reviewing data protection measures and preparing incident response plans in case of data compromise.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland, Sweden, Austria
CVE-2025-10077: SQL Injection in SourceCodester Online Polling System
Description
A security vulnerability has been detected in SourceCodester Online Polling System 1.0. This impacts an unknown function of the file /registeracc.php. Such manipulation of the argument email leads to sql injection. The attack may be launched remotely. The exploit has been disclosed publicly and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-10077 is a SQL Injection vulnerability identified in SourceCodester Online Polling System version 1.0. The vulnerability resides in the /registeracc.php file, specifically in the handling of the 'email' parameter. An attacker can manipulate this parameter to inject arbitrary SQL commands into the backend database query. This injection flaw allows an unauthenticated remote attacker to execute unauthorized SQL queries without any user interaction or privileges. The vulnerability is exploitable over the network (AV:N), requires low attack complexity (AC:L), and does not require authentication (PR:N) or user interaction (UI:N). The impact on confidentiality, integrity, and availability is limited but present (VC:L, VI:L, VA:L), indicating partial compromise potential. The vulnerability has been publicly disclosed but no known exploits are currently observed in the wild. The CVSS v4.0 base score is 6.9, categorizing it as a medium severity issue. Exploitation could lead to unauthorized data access, data modification, or disruption of polling system functionality, potentially undermining the integrity of polling results and user data. The lack of patches or mitigation guidance from the vendor increases the risk for users of this software version.
Potential Impact
For European organizations using SourceCodester Online Polling System 1.0, this vulnerability poses a risk to the confidentiality and integrity of polling data and user information. Exploitation could allow attackers to extract sensitive data such as user emails or manipulate polling results, which can affect decision-making processes, public opinion analysis, or internal organizational surveys. This is particularly critical for public sector entities, political organizations, or companies relying on polling data for strategic decisions. Additionally, data breaches involving personal information may lead to GDPR violations, resulting in legal and financial penalties. The availability impact is limited but could cause temporary disruption of polling services, affecting user trust and operational continuity. Since the vulnerability is remotely exploitable without authentication, attackers can target exposed systems over the internet, increasing the attack surface for European organizations with public-facing polling platforms.
Mitigation Recommendations
Organizations should immediately audit their use of SourceCodester Online Polling System version 1.0 and identify any exposed instances of /registeracc.php. Given the absence of official patches, mitigation should focus on implementing web application firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'email' parameter. Input validation and parameterized queries should be enforced if source code access is available, replacing vulnerable SQL query constructions. Network-level restrictions should be applied to limit access to the polling system to trusted IP ranges where feasible. Regular monitoring of logs for suspicious SQL syntax or unusual query patterns is recommended to detect exploitation attempts. Organizations should also consider migrating to updated or alternative polling solutions with secure coding practices. Finally, ensure compliance with GDPR by reviewing data protection measures and preparing incident response plans in case of data compromise.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-07T11:48:50.626Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68be35f6e3f0bafba8aaf712
Added to database: 9/8/2025, 1:48:38 AM
Last enriched: 9/8/2025, 2:03:07 AM
Last updated: 9/8/2025, 10:33:24 AM
Views: 8
Related Threats
Windows Defender's vulnerability: Break The Protective Shell Of Windows Defender With The Folder Redirect Technique
MediumCVE-2025-36853: CWE-190: Integer Overflow or Wraparound in Microsoft .NET 6.0
HighCVE-2025-36854: CWE-416: Use After Free in Microsoft .NET 6.0
HighCVE-2025-36855: CWE-126: Buffer Over-read in Microsoft .NET 6.0
HighCVE-2025-22956: n/a
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.