CVE-2025-10419: SQL Injection in SourceCodester Student Grading System
A security vulnerability has been detected in SourceCodester Student Grading System 1.0. Affected by this issue is some unknown functionality of the file /del_promote.php. Such manipulation of the argument sy leads to sql injection. The attack can be launched remotely. The exploit has been disclosed publicly and may be used.
AI Analysis
Technical Summary
CVE-2025-10419 is a medium-severity SQL Injection vulnerability identified in version 1.0 of the SourceCodester Student Grading System. The vulnerability resides in the /del_promote.php file, specifically in the handling of the 'sy' parameter. An attacker can remotely manipulate this parameter to inject malicious SQL code into the backend database queries. This injection flaw allows unauthorized modification or retrieval of sensitive data stored within the database. The vulnerability requires no user interaction and can be exploited remotely without authentication, increasing its risk profile. However, the CVSS vector indicates a low complexity attack (AC:L) but requires low privileges (PR:L), meaning some level of access to the system is needed, though no user interaction is necessary. The impact on confidentiality, integrity, and availability is limited to low levels, suggesting that while data exposure or modification is possible, it may not lead to full system compromise or widespread disruption. No public exploit is currently known to be actively used in the wild, but the exploit details have been disclosed publicly, which could increase the likelihood of future exploitation. The vulnerability affects only version 1.0 of the Student Grading System, which is a niche educational software product primarily used by academic institutions for managing student grades and promotions.
Potential Impact
For European organizations, particularly educational institutions using the SourceCodester Student Grading System version 1.0, this vulnerability poses a risk of unauthorized data access and manipulation. Exploitation could lead to exposure or alteration of student grades, academic records, or promotion statuses, potentially undermining the integrity of academic evaluations. This could result in reputational damage, loss of trust from students and parents, and possible regulatory scrutiny under data protection laws such as GDPR if personal data is compromised. However, the limited scope of the affected software and the medium severity rating suggest that the overall impact on large-scale educational infrastructure is moderate. Institutions relying heavily on this system without additional security controls may face operational disruptions or data integrity issues. Since the vulnerability requires some level of privilege, attackers might need to gain initial access through other means, which somewhat limits the attack surface. Nonetheless, the remote exploitability and public disclosure increase the urgency for mitigation.
Mitigation Recommendations
Organizations should immediately assess their use of SourceCodester Student Grading System version 1.0 and prioritize upgrading to a patched or newer version if available. In the absence of an official patch, administrators should implement strict input validation and sanitization on the 'sy' parameter in /del_promote.php to prevent SQL injection. Employing Web Application Firewalls (WAFs) configured to detect and block SQL injection patterns targeting this endpoint can provide an additional layer of defense. Restricting access to the grading system to trusted networks and enforcing strong authentication and authorization controls can reduce the risk of privilege escalation required for exploitation. Regular security audits and code reviews should be conducted to identify and remediate similar injection flaws. Additionally, monitoring logs for unusual database query patterns or access attempts to /del_promote.php can help detect exploitation attempts early. Backup procedures should be verified to ensure data recovery in case of integrity compromise.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-10419: SQL Injection in SourceCodester Student Grading System
Description
A security vulnerability has been detected in SourceCodester Student Grading System 1.0. Affected by this issue is some unknown functionality of the file /del_promote.php. Such manipulation of the argument sy leads to sql injection. The attack can be launched remotely. The exploit has been disclosed publicly and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-10419 is a medium-severity SQL Injection vulnerability identified in version 1.0 of the SourceCodester Student Grading System. The vulnerability resides in the /del_promote.php file, specifically in the handling of the 'sy' parameter. An attacker can remotely manipulate this parameter to inject malicious SQL code into the backend database queries. This injection flaw allows unauthorized modification or retrieval of sensitive data stored within the database. The vulnerability requires no user interaction and can be exploited remotely without authentication, increasing its risk profile. However, the CVSS vector indicates a low complexity attack (AC:L) but requires low privileges (PR:L), meaning some level of access to the system is needed, though no user interaction is necessary. The impact on confidentiality, integrity, and availability is limited to low levels, suggesting that while data exposure or modification is possible, it may not lead to full system compromise or widespread disruption. No public exploit is currently known to be actively used in the wild, but the exploit details have been disclosed publicly, which could increase the likelihood of future exploitation. The vulnerability affects only version 1.0 of the Student Grading System, which is a niche educational software product primarily used by academic institutions for managing student grades and promotions.
Potential Impact
For European organizations, particularly educational institutions using the SourceCodester Student Grading System version 1.0, this vulnerability poses a risk of unauthorized data access and manipulation. Exploitation could lead to exposure or alteration of student grades, academic records, or promotion statuses, potentially undermining the integrity of academic evaluations. This could result in reputational damage, loss of trust from students and parents, and possible regulatory scrutiny under data protection laws such as GDPR if personal data is compromised. However, the limited scope of the affected software and the medium severity rating suggest that the overall impact on large-scale educational infrastructure is moderate. Institutions relying heavily on this system without additional security controls may face operational disruptions or data integrity issues. Since the vulnerability requires some level of privilege, attackers might need to gain initial access through other means, which somewhat limits the attack surface. Nonetheless, the remote exploitability and public disclosure increase the urgency for mitigation.
Mitigation Recommendations
Organizations should immediately assess their use of SourceCodester Student Grading System version 1.0 and prioritize upgrading to a patched or newer version if available. In the absence of an official patch, administrators should implement strict input validation and sanitization on the 'sy' parameter in /del_promote.php to prevent SQL injection. Employing Web Application Firewalls (WAFs) configured to detect and block SQL injection patterns targeting this endpoint can provide an additional layer of defense. Restricting access to the grading system to trusted networks and enforcing strong authentication and authorization controls can reduce the risk of privilege escalation required for exploitation. Regular security audits and code reviews should be conducted to identify and remediate similar injection flaws. Additionally, monitoring logs for unusual database query patterns or access attempts to /del_promote.php can help detect exploitation attempts early. Backup procedures should be verified to ensure data recovery in case of integrity compromise.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-14T06:26:19.465Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68c7691a39776bc2a1471161
Added to database: 9/15/2025, 1:17:14 AM
Last enriched: 9/15/2025, 1:32:25 AM
Last updated: 10/30/2025, 1:34:13 PM
Views: 60
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
X-Request-Purpose: Identifying "research" and bug bounty related scans?, (Thu, Oct 30th)
MediumCVE-2025-10348: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Eveo URVE Smart Office
MediumMillions Impacted by Conduent Data Breach
MediumCVE-2025-63608: n/a
HighMajor US Telecom Backbone Firm Hacked by Nation-State Actors
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.