CVE-2025-10112: SQL Injection in itsourcecode Student Information Management System
A weakness has been identified in itsourcecode Student Information Management System 1.0. The impacted element is an unknown function of the file /admin/modules/department/index.php. This manipulation of the argument ID causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.
AI Analysis
Technical Summary
CVE-2025-10112 is a SQL Injection vulnerability identified in version 1.0 of the itsourcecode Student Information Management System (SIMS). The vulnerability exists in an unspecified function within the file /admin/modules/department/index.php, where the manipulation of the 'ID' parameter allows an attacker to inject malicious SQL code. This injection flaw can be exploited remotely without requiring any authentication or user interaction, making it highly accessible to attackers. The vulnerability enables an adversary to execute arbitrary SQL commands against the backend database, potentially leading to unauthorized data access, data modification, or even deletion. Given that the affected system is a student information management platform, the compromised data could include sensitive personal information such as student records, grades, and administrative details. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the network attack vector, low attack complexity, no privileges or user interaction required, and limited impact on confidentiality, integrity, and availability. However, the exploit code has been publicly disclosed, increasing the risk of exploitation by opportunistic attackers. No official patches or fixes have been published yet, which leaves organizations using this software exposed until mitigations or updates are applied.
Potential Impact
For European organizations, especially educational institutions and administrative bodies using the itsourcecode Student Information Management System, this vulnerability poses a significant risk. Exploitation could lead to unauthorized disclosure of sensitive student and staff data, violating GDPR and other data protection regulations, potentially resulting in legal penalties and reputational damage. Integrity of student records could be compromised, affecting academic evaluations and administrative decisions. Availability impacts, while limited, could disrupt access to critical educational services if the database is manipulated or corrupted. The remote and unauthenticated nature of the exploit increases the likelihood of attacks, particularly in environments where the system is exposed to the internet or insufficiently segmented. The public availability of exploit code further elevates the threat, making rapid response and mitigation essential to prevent data breaches and operational disruptions.
Mitigation Recommendations
Given the absence of official patches, European organizations should implement immediate compensating controls. These include: 1) Restricting network access to the Student Information Management System by implementing firewall rules and network segmentation to limit exposure to trusted internal networks only; 2) Employing Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'ID' parameter in the affected endpoint; 3) Conducting thorough input validation and sanitization on all user-supplied parameters, especially the 'ID' argument, to prevent injection attacks; 4) Monitoring logs for unusual database queries or error messages indicative of exploitation attempts; 5) Regularly backing up databases and verifying backup integrity to enable recovery in case of data corruption; 6) Planning and prioritizing an upgrade or migration to a patched or alternative system version once available; 7) Educating IT staff and administrators about the vulnerability and signs of exploitation to enhance detection and response capabilities.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Austria
CVE-2025-10112: SQL Injection in itsourcecode Student Information Management System
Description
A weakness has been identified in itsourcecode Student Information Management System 1.0. The impacted element is an unknown function of the file /admin/modules/department/index.php. This manipulation of the argument ID causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.
AI-Powered Analysis
Technical Analysis
CVE-2025-10112 is a SQL Injection vulnerability identified in version 1.0 of the itsourcecode Student Information Management System (SIMS). The vulnerability exists in an unspecified function within the file /admin/modules/department/index.php, where the manipulation of the 'ID' parameter allows an attacker to inject malicious SQL code. This injection flaw can be exploited remotely without requiring any authentication or user interaction, making it highly accessible to attackers. The vulnerability enables an adversary to execute arbitrary SQL commands against the backend database, potentially leading to unauthorized data access, data modification, or even deletion. Given that the affected system is a student information management platform, the compromised data could include sensitive personal information such as student records, grades, and administrative details. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the network attack vector, low attack complexity, no privileges or user interaction required, and limited impact on confidentiality, integrity, and availability. However, the exploit code has been publicly disclosed, increasing the risk of exploitation by opportunistic attackers. No official patches or fixes have been published yet, which leaves organizations using this software exposed until mitigations or updates are applied.
Potential Impact
For European organizations, especially educational institutions and administrative bodies using the itsourcecode Student Information Management System, this vulnerability poses a significant risk. Exploitation could lead to unauthorized disclosure of sensitive student and staff data, violating GDPR and other data protection regulations, potentially resulting in legal penalties and reputational damage. Integrity of student records could be compromised, affecting academic evaluations and administrative decisions. Availability impacts, while limited, could disrupt access to critical educational services if the database is manipulated or corrupted. The remote and unauthenticated nature of the exploit increases the likelihood of attacks, particularly in environments where the system is exposed to the internet or insufficiently segmented. The public availability of exploit code further elevates the threat, making rapid response and mitigation essential to prevent data breaches and operational disruptions.
Mitigation Recommendations
Given the absence of official patches, European organizations should implement immediate compensating controls. These include: 1) Restricting network access to the Student Information Management System by implementing firewall rules and network segmentation to limit exposure to trusted internal networks only; 2) Employing Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'ID' parameter in the affected endpoint; 3) Conducting thorough input validation and sanitization on all user-supplied parameters, especially the 'ID' argument, to prevent injection attacks; 4) Monitoring logs for unusual database queries or error messages indicative of exploitation attempts; 5) Regularly backing up databases and verifying backup integrity to enable recovery in case of data corruption; 6) Planning and prioritizing an upgrade or migration to a patched or alternative system version once available; 7) Educating IT staff and administrators about the vulnerability and signs of exploitation to enhance detection and response capabilities.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-08T14:20:10.050Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68bf6ad1d5a2966cfc843641
Added to database: 9/8/2025, 11:46:25 PM
Last enriched: 9/9/2025, 12:01:53 AM
Last updated: 9/10/2025, 3:10:20 AM
Views: 8
Related Threats
CVE-2025-59038: CWE-506: Embedded Malicious Code in prebid Prebid.js
HighCVE-2025-10197: SQL Injection in HJSoft HCM Human Resources Management System
MediumCVE-2025-10195: Improper Export of Android Application Components in Seismic App
MediumCVE-2025-21417: CWE-122: Heap-based Buffer Overflow in Microsoft Windows 10 Version 1809
HighCVE-2025-21409: CWE-122: Heap-based Buffer Overflow in Microsoft Windows 10 Version 1809
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.