Skip to main content

CVE-2025-10396: SQL Injection in SourceCodester Pet Grooming Management Software

Medium
VulnerabilityCVE-2025-10396cvecve-2025-10396
Published: Sun Sep 14 2025 (09/14/2025, 08:32:06 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: Pet Grooming Management Software

Description

A vulnerability was determined in SourceCodester Pet Grooming Management Software 1.0. Affected by this issue is some unknown functionality of the file /admin/edit_role.php. Executing manipulation of the argument ID can lead to sql injection. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized.

AI-Powered Analysis

AILast updated: 09/14/2025, 08:42:38 UTC

Technical Analysis

CVE-2025-10396 is a SQL Injection vulnerability identified in SourceCodester Pet Grooming Management Software version 1.0, specifically within the /admin/edit_role.php file. The vulnerability arises due to improper sanitization or validation of the 'ID' parameter, which is manipulated by an attacker to inject malicious SQL code. This injection flaw allows an unauthenticated remote attacker to execute arbitrary SQL queries against the backend database without requiring any user interaction or privileges. The vulnerability has a CVSS 4.0 base score of 6.9, indicating a medium severity level. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact on confidentiality, integrity, and availability is low to limited, suggesting that while the attacker can manipulate data or retrieve some information, the scope of damage is somewhat constrained. The vulnerability is publicly disclosed, but no known exploits are currently observed in the wild. Given the nature of the software—a niche pet grooming management system—the exposure depends on the deployment scale and the sensitivity of the data managed. The vulnerability's exploitation could lead to unauthorized data access, modification of role permissions, or potential escalation of privileges within the application, thereby compromising the integrity and confidentiality of the system's data.

Potential Impact

For European organizations using SourceCodester Pet Grooming Management Software 1.0, this vulnerability poses a risk of unauthorized database access and manipulation. Although the software targets a specialized market segment, businesses such as pet grooming chains, veterinary clinics, or pet service providers in Europe could face data breaches involving customer information, employee roles, or operational data. The compromise of role management functionality could allow attackers to escalate privileges, potentially leading to broader system compromise. This may result in regulatory non-compliance issues under GDPR if personal data is exposed, leading to financial penalties and reputational damage. The medium severity rating reflects a moderate risk; however, the lack of authentication requirements and remote exploitability increase the urgency for mitigation. Organizations relying on this software should assess their exposure and consider the potential operational disruptions and data confidentiality impacts.

Mitigation Recommendations

To mitigate CVE-2025-10396, organizations should first verify if they are running SourceCodester Pet Grooming Management Software version 1.0. Since no official patch links are provided, immediate mitigation steps include implementing Web Application Firewall (WAF) rules to detect and block SQL injection patterns targeting the 'ID' parameter in /admin/edit_role.php. Input validation and parameterized queries should be enforced at the application level to sanitize all user inputs rigorously. Restricting access to the /admin directory via IP whitelisting or VPN-only access can reduce exposure. Regularly monitoring logs for suspicious SQL query patterns or unusual access attempts is crucial. If possible, upgrading to a newer, patched version of the software or applying vendor-provided patches once available is recommended. Additionally, conducting a thorough security review of the application’s role management and database interaction code can help identify and remediate similar vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-13T15:19:43.899Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c67fea0a4526498bada67e

Added to database: 9/14/2025, 8:42:18 AM

Last enriched: 9/14/2025, 8:42:38 AM

Last updated: 9/14/2025, 11:01:21 AM

Views: 5

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats