Skip to main content

CVE-2025-10387: SQL Injection in codesiddhant Jasmin Ransomware

Medium
VulnerabilityCVE-2025-10387cvecve-2025-10387
Published: Sun Sep 14 2025 (09/14/2025, 03:02:05 UTC)
Source: CVE Database V5
Vendor/Project: codesiddhant
Product: Jasmin Ransomware

Description

A vulnerability was determined in codesiddhant Jasmin Ransomware up to 1.0.1. This vulnerability affects unknown code of the file /handshake.php. This manipulation of the argument machine_name/computer_user/os/date/time/ip/location/systemid/password causes sql injection. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 09/14/2025, 03:12:21 UTC

Technical Analysis

CVE-2025-10387 is a medium-severity SQL Injection vulnerability identified in the codesiddhant Jasmin Ransomware versions up to 1.0.1. The vulnerability resides in the /handshake.php file, where multiple input parameters—machine_name, computer_user, os, date, time, ip, location, systemid, and password—are susceptible to SQL injection attacks. This means that an attacker can remotely manipulate these parameters to inject malicious SQL code, potentially compromising the backend database. The vulnerability does not require user interaction or authentication, making it remotely exploitable over the network. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). The vendor was notified but has not responded or issued a patch, and no known exploits have been observed in the wild yet. Given that this vulnerability is in ransomware software itself, it is unusual but suggests that the ransomware may have a command-and-control or management interface vulnerable to injection, which could be leveraged by defenders or attackers to manipulate ransomware operations or data. The lack of patch links and vendor response increases the risk of exploitation over time.

Potential Impact

For European organizations, the presence of this vulnerability in Jasmin Ransomware could have several implications. If attackers exploit this SQL injection flaw, they could potentially manipulate ransomware operations, extract sensitive data related to ransomware campaigns, or disrupt ransomware functionality, which might affect incident response and forensic investigations. Moreover, if the ransomware is used in targeted attacks against European entities, this vulnerability could be leveraged to gain additional footholds or pivot within networks. The medium severity indicates moderate risk; however, the ransomware context and remote exploitability without user interaction elevate the concern. Organizations relying on threat intelligence or defense tools that interact with this ransomware or its infrastructure might be indirectly impacted. Additionally, the lack of vendor response and patches means that European cybersecurity teams must proactively monitor and mitigate risks associated with this vulnerability.

Mitigation Recommendations

Since no official patch is available, European organizations should implement specific mitigations: 1) Monitor network traffic for unusual requests to /handshake.php endpoints or suspicious parameters indicative of SQL injection attempts. 2) Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the specified parameters. 3) Restrict network access to known ransomware command-and-control infrastructure where possible, using threat intelligence feeds. 4) Conduct regular security assessments and penetration testing focusing on SQL injection vulnerabilities in any internal or external-facing interfaces related to ransomware management or analysis tools. 5) Enhance logging and alerting for anomalous database queries or errors that may indicate exploitation attempts. 6) Collaborate with cybersecurity communities to share intelligence and monitor for emerging exploits targeting this vulnerability. 7) Prepare incident response plans that consider potential manipulation of ransomware infrastructure via this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-13T09:37:08.368Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c632832da15045691e1848

Added to database: 9/14/2025, 3:12:03 AM

Last enriched: 9/14/2025, 3:12:21 AM

Last updated: 9/14/2025, 6:30:25 AM

Views: 7

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats