CVE-2025-10113: SQL Injection in itsourcecode Student Information Management System
A security vulnerability has been detected in itsourcecode Student Information Management System 1.0. This affects an unknown function of the file /admin/modules/room/index.php. Such manipulation of the argument ID leads to sql injection. The attack may be performed from remote. The exploit has been disclosed publicly and may be used.
AI Analysis
Technical Summary
CVE-2025-10113 is a SQL Injection vulnerability identified in version 1.0 of the itsourcecode Student Information Management System (SIMS). The vulnerability exists in an unspecified function within the file /admin/modules/room/index.php. Specifically, the issue arises from improper sanitization or validation of the 'ID' parameter, which can be manipulated by an attacker to inject malicious SQL code. This injection flaw allows an attacker to execute arbitrary SQL queries on the backend database remotely without requiring authentication or user interaction. The vulnerability has been publicly disclosed, increasing the risk of exploitation, although no known exploits have been observed in the wild to date. The CVSS v4.0 base score is 6.9, categorized as medium severity, reflecting the network attack vector, low attack complexity, no privileges or user interaction needed, and limited impact on confidentiality, integrity, and availability. The vulnerability could potentially allow unauthorized data access, modification, or deletion within the student information system database, compromising sensitive student records and administrative data. Given the nature of the affected system—a student information management platform—this vulnerability could expose personally identifiable information (PII), academic records, and other confidential educational data if exploited.
Potential Impact
For European organizations, particularly educational institutions using the itsourcecode Student Information Management System version 1.0, this vulnerability poses a significant risk to the confidentiality and integrity of student and administrative data. Exploitation could lead to unauthorized disclosure of sensitive personal data protected under GDPR, resulting in legal and regulatory consequences, reputational damage, and potential financial penalties. The integrity of academic records could be compromised, affecting student evaluations and institutional operations. Additionally, disruption or data manipulation could impact availability of critical student management functions. The remote and unauthenticated nature of the exploit increases the threat surface, enabling attackers to target vulnerable systems from anywhere. European educational institutions often hold large volumes of sensitive data, making them attractive targets for data theft or sabotage. The medium severity rating suggests that while the vulnerability is exploitable, the impact is somewhat limited, but still significant enough to warrant prompt remediation to avoid data breaches and operational disruptions.
Mitigation Recommendations
1. Immediate upgrade or patching: Organizations should check for any official patches or updates from itsourcecode addressing this vulnerability. If unavailable, consider applying custom fixes such as input validation and parameterized queries to sanitize the 'ID' parameter in /admin/modules/room/index.php. 2. Web Application Firewall (WAF): Deploy a WAF with SQL injection detection and prevention rules tailored to block malicious payloads targeting the vulnerable parameter. 3. Access controls: Restrict access to the /admin/modules/room/index.php endpoint to trusted IP addresses or VPN users to reduce exposure. 4. Database permissions: Limit database user privileges used by the application to only necessary operations, minimizing potential damage from injection attacks. 5. Monitoring and logging: Implement detailed logging and real-time monitoring for unusual database queries or application behavior indicative of injection attempts. 6. Incident response readiness: Prepare to respond to potential data breaches by having data backup, forensic, and notification procedures in place. 7. Code review and secure development: Conduct thorough code audits of the entire application to identify and remediate similar injection flaws and enforce secure coding practices moving forward.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-10113: SQL Injection in itsourcecode Student Information Management System
Description
A security vulnerability has been detected in itsourcecode Student Information Management System 1.0. This affects an unknown function of the file /admin/modules/room/index.php. Such manipulation of the argument ID leads to sql injection. The attack may be performed from remote. The exploit has been disclosed publicly and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-10113 is a SQL Injection vulnerability identified in version 1.0 of the itsourcecode Student Information Management System (SIMS). The vulnerability exists in an unspecified function within the file /admin/modules/room/index.php. Specifically, the issue arises from improper sanitization or validation of the 'ID' parameter, which can be manipulated by an attacker to inject malicious SQL code. This injection flaw allows an attacker to execute arbitrary SQL queries on the backend database remotely without requiring authentication or user interaction. The vulnerability has been publicly disclosed, increasing the risk of exploitation, although no known exploits have been observed in the wild to date. The CVSS v4.0 base score is 6.9, categorized as medium severity, reflecting the network attack vector, low attack complexity, no privileges or user interaction needed, and limited impact on confidentiality, integrity, and availability. The vulnerability could potentially allow unauthorized data access, modification, or deletion within the student information system database, compromising sensitive student records and administrative data. Given the nature of the affected system—a student information management platform—this vulnerability could expose personally identifiable information (PII), academic records, and other confidential educational data if exploited.
Potential Impact
For European organizations, particularly educational institutions using the itsourcecode Student Information Management System version 1.0, this vulnerability poses a significant risk to the confidentiality and integrity of student and administrative data. Exploitation could lead to unauthorized disclosure of sensitive personal data protected under GDPR, resulting in legal and regulatory consequences, reputational damage, and potential financial penalties. The integrity of academic records could be compromised, affecting student evaluations and institutional operations. Additionally, disruption or data manipulation could impact availability of critical student management functions. The remote and unauthenticated nature of the exploit increases the threat surface, enabling attackers to target vulnerable systems from anywhere. European educational institutions often hold large volumes of sensitive data, making them attractive targets for data theft or sabotage. The medium severity rating suggests that while the vulnerability is exploitable, the impact is somewhat limited, but still significant enough to warrant prompt remediation to avoid data breaches and operational disruptions.
Mitigation Recommendations
1. Immediate upgrade or patching: Organizations should check for any official patches or updates from itsourcecode addressing this vulnerability. If unavailable, consider applying custom fixes such as input validation and parameterized queries to sanitize the 'ID' parameter in /admin/modules/room/index.php. 2. Web Application Firewall (WAF): Deploy a WAF with SQL injection detection and prevention rules tailored to block malicious payloads targeting the vulnerable parameter. 3. Access controls: Restrict access to the /admin/modules/room/index.php endpoint to trusted IP addresses or VPN users to reduce exposure. 4. Database permissions: Limit database user privileges used by the application to only necessary operations, minimizing potential damage from injection attacks. 5. Monitoring and logging: Implement detailed logging and real-time monitoring for unusual database queries or application behavior indicative of injection attempts. 6. Incident response readiness: Prepare to respond to potential data breaches by having data backup, forensic, and notification procedures in place. 7. Code review and secure development: Conduct thorough code audits of the entire application to identify and remediate similar injection flaws and enforce secure coding practices moving forward.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-08T14:20:12.759Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68bf71d9d5a2966cfc847710
Added to database: 9/9/2025, 12:16:25 AM
Last enriched: 9/9/2025, 12:31:28 AM
Last updated: 9/10/2025, 3:10:20 AM
Views: 7
Related Threats
CVE-2025-59038: CWE-506: Embedded Malicious Code in prebid Prebid.js
HighCVE-2025-10197: SQL Injection in HJSoft HCM Human Resources Management System
MediumCVE-2025-10195: Improper Export of Android Application Components in Seismic App
MediumCVE-2025-21417: CWE-122: Heap-based Buffer Overflow in Microsoft Windows 10 Version 1809
HighCVE-2025-21409: CWE-122: Heap-based Buffer Overflow in Microsoft Windows 10 Version 1809
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.