Skip to main content

CVE-2025-10409: SQL Injection in SourceCodester Student Grading System

Medium
VulnerabilityCVE-2025-10409cvecve-2025-10409
Published: Sun Sep 14 2025 (09/14/2025, 20:32:06 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: Student Grading System

Description

A weakness has been identified in SourceCodester Student Grading System 1.0. This affects an unknown part of the file /rms.php?page=users. Executing manipulation of the argument fname can lead to sql injection. The attack can be launched remotely. The exploit has been made available to the public and could be exploited.

AI-Powered Analysis

AILast updated: 09/14/2025, 20:38:41 UTC

Technical Analysis

CVE-2025-10409 is a medium-severity SQL Injection vulnerability identified in SourceCodester Student Grading System version 1.0. The vulnerability exists in the /rms.php script, specifically in the handling of the 'fname' parameter within the 'users' page. An attacker can remotely manipulate this parameter to inject malicious SQL code, potentially allowing unauthorized access or modification of the underlying database. The vulnerability does not require user interaction or authentication, making it easier to exploit remotely over the network. The CVSS 4.0 base score is 5.3, reflecting a moderate impact with low complexity of attack and no privileges required. The vulnerability affects confidentiality, integrity, and availability at a low level, as the vector components indicate limited impact on these security properties. Although no public exploit is confirmed to be in the wild, proof-of-concept code is available, increasing the risk of exploitation. The lack of available patches or official fixes at the time of publication means affected organizations must rely on mitigation strategies until a vendor patch is released.

Potential Impact

For European organizations, especially educational institutions or entities using the SourceCodester Student Grading System 1.0, this vulnerability poses a risk of unauthorized data access or manipulation. Attackers exploiting this SQL Injection could extract sensitive student information, alter grading data, or disrupt system availability. Such breaches could lead to privacy violations under GDPR, reputational damage, and potential regulatory penalties. The remote and unauthenticated nature of the exploit increases the attack surface, particularly for institutions with internet-facing grading systems. The impact is heightened in environments where the grading system interfaces with other critical academic or administrative databases, potentially allowing lateral movement or data corruption beyond the grading system itself.

Mitigation Recommendations

Immediate mitigation should include implementing strict input validation and sanitization on the 'fname' parameter to prevent SQL Injection. Organizations should employ Web Application Firewalls (WAFs) configured to detect and block SQL Injection attempts targeting the vulnerable endpoint. Network segmentation should isolate the grading system from other critical systems to limit potential lateral movement. Monitoring and logging of database queries and web requests to /rms.php?page=users should be enhanced to detect suspicious activity. Until an official patch is released, consider disabling or restricting access to the vulnerable functionality if feasible. Additionally, conducting a thorough code review and applying parameterized queries or prepared statements in the application source code will address the root cause. Regular vulnerability scanning and penetration testing focused on SQL Injection vectors are recommended to identify and remediate similar issues proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-13T19:53:47.935Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c727b86b2b635a0cd65b9c

Added to database: 9/14/2025, 8:38:16 PM

Last enriched: 9/14/2025, 8:38:41 PM

Last updated: 9/14/2025, 10:04:15 PM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats