CVE-2025-10409: SQL Injection in SourceCodester Student Grading System
A weakness has been identified in SourceCodester Student Grading System 1.0. This affects an unknown part of the file /rms.php?page=users. Executing manipulation of the argument fname can lead to sql injection. The attack can be launched remotely. The exploit has been made available to the public and could be exploited.
AI Analysis
Technical Summary
CVE-2025-10409 is a medium-severity SQL Injection vulnerability identified in SourceCodester Student Grading System version 1.0. The vulnerability exists in the /rms.php script, specifically in the handling of the 'fname' parameter within the 'users' page. An attacker can remotely manipulate this parameter to inject malicious SQL code, potentially allowing unauthorized access or modification of the underlying database. The vulnerability does not require user interaction or authentication, making it easier to exploit remotely over the network. The CVSS 4.0 base score is 5.3, reflecting a moderate impact with low complexity of attack and no privileges required. The vulnerability affects confidentiality, integrity, and availability at a low level, as the vector components indicate limited impact on these security properties. Although no public exploit is confirmed to be in the wild, proof-of-concept code is available, increasing the risk of exploitation. The lack of available patches or official fixes at the time of publication means affected organizations must rely on mitigation strategies until a vendor patch is released.
Potential Impact
For European organizations, especially educational institutions or entities using the SourceCodester Student Grading System 1.0, this vulnerability poses a risk of unauthorized data access or manipulation. Attackers exploiting this SQL Injection could extract sensitive student information, alter grading data, or disrupt system availability. Such breaches could lead to privacy violations under GDPR, reputational damage, and potential regulatory penalties. The remote and unauthenticated nature of the exploit increases the attack surface, particularly for institutions with internet-facing grading systems. The impact is heightened in environments where the grading system interfaces with other critical academic or administrative databases, potentially allowing lateral movement or data corruption beyond the grading system itself.
Mitigation Recommendations
Immediate mitigation should include implementing strict input validation and sanitization on the 'fname' parameter to prevent SQL Injection. Organizations should employ Web Application Firewalls (WAFs) configured to detect and block SQL Injection attempts targeting the vulnerable endpoint. Network segmentation should isolate the grading system from other critical systems to limit potential lateral movement. Monitoring and logging of database queries and web requests to /rms.php?page=users should be enhanced to detect suspicious activity. Until an official patch is released, consider disabling or restricting access to the vulnerable functionality if feasible. Additionally, conducting a thorough code review and applying parameterized queries or prepared statements in the application source code will address the root cause. Regular vulnerability scanning and penetration testing focused on SQL Injection vectors are recommended to identify and remediate similar issues proactively.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-10409: SQL Injection in SourceCodester Student Grading System
Description
A weakness has been identified in SourceCodester Student Grading System 1.0. This affects an unknown part of the file /rms.php?page=users. Executing manipulation of the argument fname can lead to sql injection. The attack can be launched remotely. The exploit has been made available to the public and could be exploited.
AI-Powered Analysis
Technical Analysis
CVE-2025-10409 is a medium-severity SQL Injection vulnerability identified in SourceCodester Student Grading System version 1.0. The vulnerability exists in the /rms.php script, specifically in the handling of the 'fname' parameter within the 'users' page. An attacker can remotely manipulate this parameter to inject malicious SQL code, potentially allowing unauthorized access or modification of the underlying database. The vulnerability does not require user interaction or authentication, making it easier to exploit remotely over the network. The CVSS 4.0 base score is 5.3, reflecting a moderate impact with low complexity of attack and no privileges required. The vulnerability affects confidentiality, integrity, and availability at a low level, as the vector components indicate limited impact on these security properties. Although no public exploit is confirmed to be in the wild, proof-of-concept code is available, increasing the risk of exploitation. The lack of available patches or official fixes at the time of publication means affected organizations must rely on mitigation strategies until a vendor patch is released.
Potential Impact
For European organizations, especially educational institutions or entities using the SourceCodester Student Grading System 1.0, this vulnerability poses a risk of unauthorized data access or manipulation. Attackers exploiting this SQL Injection could extract sensitive student information, alter grading data, or disrupt system availability. Such breaches could lead to privacy violations under GDPR, reputational damage, and potential regulatory penalties. The remote and unauthenticated nature of the exploit increases the attack surface, particularly for institutions with internet-facing grading systems. The impact is heightened in environments where the grading system interfaces with other critical academic or administrative databases, potentially allowing lateral movement or data corruption beyond the grading system itself.
Mitigation Recommendations
Immediate mitigation should include implementing strict input validation and sanitization on the 'fname' parameter to prevent SQL Injection. Organizations should employ Web Application Firewalls (WAFs) configured to detect and block SQL Injection attempts targeting the vulnerable endpoint. Network segmentation should isolate the grading system from other critical systems to limit potential lateral movement. Monitoring and logging of database queries and web requests to /rms.php?page=users should be enhanced to detect suspicious activity. Until an official patch is released, consider disabling or restricting access to the vulnerable functionality if feasible. Additionally, conducting a thorough code review and applying parameterized queries or prepared statements in the application source code will address the root cause. Regular vulnerability scanning and penetration testing focused on SQL Injection vectors are recommended to identify and remediate similar issues proactively.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-13T19:53:47.935Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68c727b86b2b635a0cd65b9c
Added to database: 9/14/2025, 8:38:16 PM
Last enriched: 9/14/2025, 8:38:41 PM
Last updated: 9/14/2025, 10:04:15 PM
Views: 4
Related Threats
CVE-2025-59364: CWE-674 Uncontrolled Recursion in Express XSS Sanitizer project Express XSS Sanitizer
MediumSamsung Fixes Image Parsing Vulnerability Exploited in Android Attacks
MediumCVE-2025-10413: SQL Injection in Campcodes Grocery Sales and Inventory System
MediumCVE-2025-10410: Server-Side Request Forgery in SourceCodester Link Status Checker
MediumCVE-2025-10408: SQL Injection in SourceCodester Student Grading System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.