Skip to main content

CVE-2025-10405: SQL Injection in itsourcecode Baptism Information Management System

Medium
VulnerabilityCVE-2025-10405cvecve-2025-10405
Published: Sun Sep 14 2025 (09/14/2025, 18:32:07 UTC)
Source: CVE Database V5
Vendor/Project: itsourcecode
Product: Baptism Information Management System

Description

A vulnerability was determined in itsourcecode Baptism Information Management System 1.0. Affected is an unknown function of the file /listbaptism.php. This manipulation of the argument bapt_id causes sql injection. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized.

AI-Powered Analysis

AILast updated: 09/14/2025, 18:39:47 UTC

Technical Analysis

CVE-2025-10405 is a SQL Injection vulnerability identified in version 1.0 of the itsourcecode Baptism Information Management System. The vulnerability exists in an unspecified function within the /listbaptism.php file, where the 'bapt_id' parameter is improperly sanitized or validated, allowing an attacker to inject malicious SQL code. This injection flaw can be exploited remotely without any authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/AT:N/PR:N/UI:N). The vulnerability impacts the confidentiality, integrity, and availability of the backend database, as attackers could potentially extract sensitive data, modify or delete records, or disrupt service availability. The CVSS 4.0 base score of 6.9 classifies this vulnerability as medium severity, reflecting the ease of exploitation combined with limited scope and impact (VC:L/VI:L/VA:L). Although no known exploits are currently reported in the wild, the public disclosure of the vulnerability increases the risk of exploitation by threat actors. The Baptism Information Management System is likely used by religious organizations or institutions to manage baptism records, which may contain personally identifiable information (PII) and sensitive religious data. The lack of patches or mitigation links suggests that users of version 1.0 remain vulnerable until an update or workaround is provided by the vendor or community.

Potential Impact

For European organizations, particularly religious institutions, churches, and community centers that utilize the itsourcecode Baptism Information Management System, this vulnerability poses a significant risk to the confidentiality and integrity of sensitive personal and religious data. Exploitation could lead to unauthorized disclosure of baptism records, including names, dates, and potentially other personal identifiers, violating data protection regulations such as the GDPR. Additionally, attackers could manipulate or delete records, undermining trust and operational continuity. The availability of the system could also be impacted if attackers execute destructive SQL commands or cause database corruption. Given the remote and unauthenticated nature of the exploit, attackers can easily target exposed installations, increasing the likelihood of data breaches or service disruptions. The reputational damage and potential legal consequences for mishandling personal data further amplify the impact on affected European organizations.

Mitigation Recommendations

Organizations should immediately audit their deployments of the itsourcecode Baptism Information Management System to identify any instances of version 1.0 in use. Since no official patches are currently available, administrators should implement the following specific mitigations: 1) Apply input validation and parameterized queries or prepared statements in the /listbaptism.php script to sanitize the 'bapt_id' parameter and prevent SQL injection. 2) Restrict external access to the management system by implementing network-level controls such as firewalls or VPNs to limit exposure to trusted users only. 3) Monitor and log database queries and web application traffic for suspicious activity indicative of injection attempts. 4) Regularly back up baptism data to enable recovery in case of data tampering or loss. 5) Engage with the vendor or community to obtain patches or updates addressing this vulnerability. 6) Conduct security awareness training for administrators to recognize and respond to exploitation attempts. These targeted actions go beyond generic advice by focusing on the specific vulnerable parameter and the operational context of the affected system.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-13T19:50:06.006Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c70bd7169535fb44154e47

Added to database: 9/14/2025, 6:39:19 PM

Last enriched: 9/14/2025, 6:39:47 PM

Last updated: 9/14/2025, 8:23:31 PM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats