Skip to main content

CVE-2025-10419: SQL Injection in SourceCodester Student Grading System

Medium
VulnerabilityCVE-2025-10419cvecve-2025-10419
Published: Mon Sep 15 2025 (09/15/2025, 01:02:07 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: Student Grading System

Description

A security vulnerability has been detected in SourceCodester Student Grading System 1.0. Affected by this issue is some unknown functionality of the file /del_promote.php. Such manipulation of the argument sy leads to sql injection. The attack can be launched remotely. The exploit has been disclosed publicly and may be used.

AI-Powered Analysis

AILast updated: 09/15/2025, 01:32:25 UTC

Technical Analysis

CVE-2025-10419 is a medium-severity SQL Injection vulnerability identified in version 1.0 of the SourceCodester Student Grading System. The vulnerability resides in the /del_promote.php file, specifically in the handling of the 'sy' parameter. An attacker can remotely manipulate this parameter to inject malicious SQL code into the backend database queries. This injection flaw allows unauthorized modification or retrieval of sensitive data stored within the database. The vulnerability requires no user interaction and can be exploited remotely without authentication, increasing its risk profile. However, the CVSS vector indicates a low complexity attack (AC:L) but requires low privileges (PR:L), meaning some level of access to the system is needed, though no user interaction is necessary. The impact on confidentiality, integrity, and availability is limited to low levels, suggesting that while data exposure or modification is possible, it may not lead to full system compromise or widespread disruption. No public exploit is currently known to be actively used in the wild, but the exploit details have been disclosed publicly, which could increase the likelihood of future exploitation. The vulnerability affects only version 1.0 of the Student Grading System, which is a niche educational software product primarily used by academic institutions for managing student grades and promotions.

Potential Impact

For European organizations, particularly educational institutions using the SourceCodester Student Grading System version 1.0, this vulnerability poses a risk of unauthorized data access and manipulation. Exploitation could lead to exposure or alteration of student grades, academic records, or promotion statuses, potentially undermining the integrity of academic evaluations. This could result in reputational damage, loss of trust from students and parents, and possible regulatory scrutiny under data protection laws such as GDPR if personal data is compromised. However, the limited scope of the affected software and the medium severity rating suggest that the overall impact on large-scale educational infrastructure is moderate. Institutions relying heavily on this system without additional security controls may face operational disruptions or data integrity issues. Since the vulnerability requires some level of privilege, attackers might need to gain initial access through other means, which somewhat limits the attack surface. Nonetheless, the remote exploitability and public disclosure increase the urgency for mitigation.

Mitigation Recommendations

Organizations should immediately assess their use of SourceCodester Student Grading System version 1.0 and prioritize upgrading to a patched or newer version if available. In the absence of an official patch, administrators should implement strict input validation and sanitization on the 'sy' parameter in /del_promote.php to prevent SQL injection. Employing Web Application Firewalls (WAFs) configured to detect and block SQL injection patterns targeting this endpoint can provide an additional layer of defense. Restricting access to the grading system to trusted networks and enforcing strong authentication and authorization controls can reduce the risk of privilege escalation required for exploitation. Regular security audits and code reviews should be conducted to identify and remediate similar injection flaws. Additionally, monitoring logs for unusual database query patterns or access attempts to /del_promote.php can help detect exploitation attempts early. Backup procedures should be verified to ensure data recovery in case of integrity compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-14T06:26:19.465Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c7691a39776bc2a1471161

Added to database: 9/15/2025, 1:17:14 AM

Last enriched: 9/15/2025, 1:32:25 AM

Last updated: 9/15/2025, 4:28:18 AM

Views: 5

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats