CVE-2025-10082: SQL Injection in SourceCodester Online Polling System
A vulnerability has been found in SourceCodester Online Polling System 1.0. Affected is an unknown function of the file /admin/manage-admins.php. Such manipulation of the argument email leads to sql injection. The attack can be executed remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-10082 is a SQL Injection vulnerability identified in SourceCodester Online Polling System version 1.0. The vulnerability exists in an unspecified function within the /admin/manage-admins.php file, where the 'email' parameter is improperly sanitized, allowing an attacker to inject malicious SQL code. This flaw enables remote exploitation without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/AT:N/PR:N/UI:N). Successful exploitation could lead to partial compromise of the confidentiality, integrity, and availability of the underlying database, as the vulnerability has low impact on confidentiality, integrity, and availability (VC:L/VI:L/VA:L). The vulnerability is publicly disclosed, but there are no known exploits in the wild at this time. The CVSS 4.0 base score is 6.9, categorizing it as a medium severity issue. The attack surface is limited to the affected version 1.0 of the SourceCodester Online Polling System, which is typically used for managing online polls and voting processes. Given the nature of the vulnerability, an attacker could manipulate the SQL queries to extract sensitive data, modify administrative records, or disrupt polling operations, potentially undermining the trustworthiness of polling results and administrative control.
Potential Impact
For European organizations using SourceCodester Online Polling System 1.0, this vulnerability poses a significant risk to the integrity and confidentiality of polling data and administrative controls. Exploitation could lead to unauthorized access to sensitive user or administrative information, manipulation of poll outcomes, or denial of service through database corruption. This could damage organizational reputation, violate data protection regulations such as GDPR, and disrupt decision-making processes reliant on polling data. Public sector entities, political organizations, and private companies conducting online polls in Europe could face operational and legal consequences if this vulnerability is exploited. The medium severity rating suggests that while the vulnerability is serious, it requires no authentication and no user interaction, increasing the risk of automated attacks targeting exposed systems.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade to a patched version of the SourceCodester Online Polling System once available. In the absence of an official patch, administrators should implement input validation and parameterized queries or prepared statements for all database interactions involving user-supplied input, particularly the 'email' parameter in /admin/manage-admins.php. Web application firewalls (WAFs) can be configured to detect and block SQL injection attempts targeting this endpoint. Additionally, organizations should conduct thorough code reviews and security testing to identify and remediate similar injection flaws. Monitoring database logs for unusual queries and implementing least privilege principles for database access can reduce potential damage. Finally, restricting access to the administrative interface via IP whitelisting or VPNs can limit exposure to remote attackers.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland, Sweden
CVE-2025-10082: SQL Injection in SourceCodester Online Polling System
Description
A vulnerability has been found in SourceCodester Online Polling System 1.0. Affected is an unknown function of the file /admin/manage-admins.php. Such manipulation of the argument email leads to sql injection. The attack can be executed remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-10082 is a SQL Injection vulnerability identified in SourceCodester Online Polling System version 1.0. The vulnerability exists in an unspecified function within the /admin/manage-admins.php file, where the 'email' parameter is improperly sanitized, allowing an attacker to inject malicious SQL code. This flaw enables remote exploitation without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/AT:N/PR:N/UI:N). Successful exploitation could lead to partial compromise of the confidentiality, integrity, and availability of the underlying database, as the vulnerability has low impact on confidentiality, integrity, and availability (VC:L/VI:L/VA:L). The vulnerability is publicly disclosed, but there are no known exploits in the wild at this time. The CVSS 4.0 base score is 6.9, categorizing it as a medium severity issue. The attack surface is limited to the affected version 1.0 of the SourceCodester Online Polling System, which is typically used for managing online polls and voting processes. Given the nature of the vulnerability, an attacker could manipulate the SQL queries to extract sensitive data, modify administrative records, or disrupt polling operations, potentially undermining the trustworthiness of polling results and administrative control.
Potential Impact
For European organizations using SourceCodester Online Polling System 1.0, this vulnerability poses a significant risk to the integrity and confidentiality of polling data and administrative controls. Exploitation could lead to unauthorized access to sensitive user or administrative information, manipulation of poll outcomes, or denial of service through database corruption. This could damage organizational reputation, violate data protection regulations such as GDPR, and disrupt decision-making processes reliant on polling data. Public sector entities, political organizations, and private companies conducting online polls in Europe could face operational and legal consequences if this vulnerability is exploited. The medium severity rating suggests that while the vulnerability is serious, it requires no authentication and no user interaction, increasing the risk of automated attacks targeting exposed systems.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade to a patched version of the SourceCodester Online Polling System once available. In the absence of an official patch, administrators should implement input validation and parameterized queries or prepared statements for all database interactions involving user-supplied input, particularly the 'email' parameter in /admin/manage-admins.php. Web application firewalls (WAFs) can be configured to detect and block SQL injection attempts targeting this endpoint. Additionally, organizations should conduct thorough code reviews and security testing to identify and remediate similar injection flaws. Monitoring database logs for unusual queries and implementing least privilege principles for database access can reduce potential damage. Finally, restricting access to the administrative interface via IP whitelisting or VPNs can limit exposure to remote attackers.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-07T18:30:52.523Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68be7635d5a2966cfc7c35a6
Added to database: 9/8/2025, 6:22:45 AM
Last enriched: 9/8/2025, 6:23:46 AM
Last updated: 9/9/2025, 9:12:28 PM
Views: 13
Related Threats
CVE-2025-10197: SQL Injection in HJSoft HCM Human Resources Management System
MediumCVE-2025-10195: Improper Export of Android Application Components in Seismic App
MediumCVE-2025-21417: CWE-122: Heap-based Buffer Overflow in Microsoft Windows 10 Version 1809
HighCVE-2025-21409: CWE-122: Heap-based Buffer Overflow in Microsoft Windows 10 Version 1809
HighCVE-2025-21336: CWE-203: Observable Discrepancy in Microsoft Windows 10 Version 1809
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.