Skip to main content

CVE-2025-10113: SQL Injection in itsourcecode Student Information Management System

Medium
VulnerabilityCVE-2025-10113cvecve-2025-10113
Published: Tue Sep 09 2025 (09/09/2025, 00:02:08 UTC)
Source: CVE Database V5
Vendor/Project: itsourcecode
Product: Student Information Management System

Description

A security vulnerability has been detected in itsourcecode Student Information Management System 1.0. This affects an unknown function of the file /admin/modules/room/index.php. Such manipulation of the argument ID leads to sql injection. The attack may be performed from remote. The exploit has been disclosed publicly and may be used.

AI-Powered Analysis

AILast updated: 09/09/2025, 00:31:28 UTC

Technical Analysis

CVE-2025-10113 is a SQL Injection vulnerability identified in version 1.0 of the itsourcecode Student Information Management System (SIMS). The vulnerability exists in an unspecified function within the file /admin/modules/room/index.php. Specifically, the issue arises from improper sanitization or validation of the 'ID' parameter, which can be manipulated by an attacker to inject malicious SQL code. This injection flaw allows an attacker to execute arbitrary SQL queries on the backend database remotely without requiring authentication or user interaction. The vulnerability has been publicly disclosed, increasing the risk of exploitation, although no known exploits have been observed in the wild to date. The CVSS v4.0 base score is 6.9, categorized as medium severity, reflecting the network attack vector, low attack complexity, no privileges or user interaction needed, and limited impact on confidentiality, integrity, and availability. The vulnerability could potentially allow unauthorized data access, modification, or deletion within the student information system database, compromising sensitive student records and administrative data. Given the nature of the affected system—a student information management platform—this vulnerability could expose personally identifiable information (PII), academic records, and other confidential educational data if exploited.

Potential Impact

For European organizations, particularly educational institutions using the itsourcecode Student Information Management System version 1.0, this vulnerability poses a significant risk to the confidentiality and integrity of student and administrative data. Exploitation could lead to unauthorized disclosure of sensitive personal data protected under GDPR, resulting in legal and regulatory consequences, reputational damage, and potential financial penalties. The integrity of academic records could be compromised, affecting student evaluations and institutional operations. Additionally, disruption or data manipulation could impact availability of critical student management functions. The remote and unauthenticated nature of the exploit increases the threat surface, enabling attackers to target vulnerable systems from anywhere. European educational institutions often hold large volumes of sensitive data, making them attractive targets for data theft or sabotage. The medium severity rating suggests that while the vulnerability is exploitable, the impact is somewhat limited, but still significant enough to warrant prompt remediation to avoid data breaches and operational disruptions.

Mitigation Recommendations

1. Immediate upgrade or patching: Organizations should check for any official patches or updates from itsourcecode addressing this vulnerability. If unavailable, consider applying custom fixes such as input validation and parameterized queries to sanitize the 'ID' parameter in /admin/modules/room/index.php. 2. Web Application Firewall (WAF): Deploy a WAF with SQL injection detection and prevention rules tailored to block malicious payloads targeting the vulnerable parameter. 3. Access controls: Restrict access to the /admin/modules/room/index.php endpoint to trusted IP addresses or VPN users to reduce exposure. 4. Database permissions: Limit database user privileges used by the application to only necessary operations, minimizing potential damage from injection attacks. 5. Monitoring and logging: Implement detailed logging and real-time monitoring for unusual database queries or application behavior indicative of injection attempts. 6. Incident response readiness: Prepare to respond to potential data breaches by having data backup, forensic, and notification procedures in place. 7. Code review and secure development: Conduct thorough code audits of the entire application to identify and remediate similar injection flaws and enforce secure coding practices moving forward.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-08T14:20:12.759Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68bf71d9d5a2966cfc847710

Added to database: 9/9/2025, 12:16:25 AM

Last enriched: 9/9/2025, 12:31:28 AM

Last updated: 9/10/2025, 3:10:20 AM

Views: 7

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats