CVE-2025-10420: SQL Injection in SourceCodester Student Grading System
A vulnerability was detected in SourceCodester Student Grading System 1.0. This affects an unknown part of the file /form137.php. Performing manipulation of the argument ID results in sql injection. The attack may be initiated remotely. The exploit is now public and may be used.
AI Analysis
Technical Summary
CVE-2025-10420 is a SQL Injection vulnerability identified in SourceCodester Student Grading System version 1.0, specifically in the /form137.php file. The vulnerability arises from improper sanitization or validation of the 'ID' parameter, allowing an attacker to manipulate this argument to inject malicious SQL code. This injection can be performed remotely without requiring user interaction or authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The vulnerability has a medium severity score of 5.3 under CVSS 4.0, reflecting limited but notable impact on confidentiality, integrity, and availability. Exploiting this vulnerability could allow an attacker to read, modify, or delete data within the underlying database, potentially exposing sensitive student information or altering grading records. Although no public exploits are currently known to be in the wild, the exploit code is publicly available, increasing the risk of future exploitation. The vulnerability does not require user interaction but does require low privileges (PR:L), which suggests that some level of access or authentication might be necessary, though this is minimal. The lack of a patch link indicates that a fix may not yet be available, emphasizing the need for immediate mitigation efforts. Given the nature of the affected system—a student grading platform—this vulnerability could undermine the integrity of academic records and confidentiality of student data if exploited.
Potential Impact
For European organizations, particularly educational institutions using SourceCodester Student Grading System 1.0, this vulnerability poses a significant risk. Exploitation could lead to unauthorized disclosure of student personal data, violating GDPR requirements for data protection and privacy. Alteration or deletion of grading data could disrupt academic processes and damage institutional reputation. The medium severity score reflects that while the vulnerability is exploitable remotely and without user interaction, it requires low privileges, potentially limiting the attack surface to authenticated users or insiders. However, if exploited by external attackers who gain low-level access, the impact could still be severe. Additionally, the public availability of exploit code increases the likelihood of opportunistic attacks. European educational institutions are often targeted due to the sensitive nature of their data and the critical role they play in society, making this vulnerability particularly concerning. The lack of a patch further exacerbates the risk, as organizations must rely on compensating controls to protect their systems.
Mitigation Recommendations
Given the absence of an official patch, European organizations should implement the following specific mitigations: 1) Conduct immediate code review and apply manual input validation and parameterized queries or prepared statements in the /form137.php file to prevent SQL injection. 2) Restrict access to the vulnerable application component by enforcing strict authentication and authorization controls, limiting the number of users with low privilege access. 3) Implement Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the 'ID' parameter. 4) Monitor database logs and application logs for unusual queries or access patterns indicative of injection attempts. 5) Isolate the grading system network segment to reduce exposure to external threats. 6) Educate administrators and users about the risk and signs of exploitation. 7) Prepare incident response plans specifically for potential data breaches involving student information. 8) Engage with the vendor or community to obtain or develop patches or updates addressing this vulnerability. These measures should be prioritized until an official patch is released.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-10420: SQL Injection in SourceCodester Student Grading System
Description
A vulnerability was detected in SourceCodester Student Grading System 1.0. This affects an unknown part of the file /form137.php. Performing manipulation of the argument ID results in sql injection. The attack may be initiated remotely. The exploit is now public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-10420 is a SQL Injection vulnerability identified in SourceCodester Student Grading System version 1.0, specifically in the /form137.php file. The vulnerability arises from improper sanitization or validation of the 'ID' parameter, allowing an attacker to manipulate this argument to inject malicious SQL code. This injection can be performed remotely without requiring user interaction or authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The vulnerability has a medium severity score of 5.3 under CVSS 4.0, reflecting limited but notable impact on confidentiality, integrity, and availability. Exploiting this vulnerability could allow an attacker to read, modify, or delete data within the underlying database, potentially exposing sensitive student information or altering grading records. Although no public exploits are currently known to be in the wild, the exploit code is publicly available, increasing the risk of future exploitation. The vulnerability does not require user interaction but does require low privileges (PR:L), which suggests that some level of access or authentication might be necessary, though this is minimal. The lack of a patch link indicates that a fix may not yet be available, emphasizing the need for immediate mitigation efforts. Given the nature of the affected system—a student grading platform—this vulnerability could undermine the integrity of academic records and confidentiality of student data if exploited.
Potential Impact
For European organizations, particularly educational institutions using SourceCodester Student Grading System 1.0, this vulnerability poses a significant risk. Exploitation could lead to unauthorized disclosure of student personal data, violating GDPR requirements for data protection and privacy. Alteration or deletion of grading data could disrupt academic processes and damage institutional reputation. The medium severity score reflects that while the vulnerability is exploitable remotely and without user interaction, it requires low privileges, potentially limiting the attack surface to authenticated users or insiders. However, if exploited by external attackers who gain low-level access, the impact could still be severe. Additionally, the public availability of exploit code increases the likelihood of opportunistic attacks. European educational institutions are often targeted due to the sensitive nature of their data and the critical role they play in society, making this vulnerability particularly concerning. The lack of a patch further exacerbates the risk, as organizations must rely on compensating controls to protect their systems.
Mitigation Recommendations
Given the absence of an official patch, European organizations should implement the following specific mitigations: 1) Conduct immediate code review and apply manual input validation and parameterized queries or prepared statements in the /form137.php file to prevent SQL injection. 2) Restrict access to the vulnerable application component by enforcing strict authentication and authorization controls, limiting the number of users with low privilege access. 3) Implement Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the 'ID' parameter. 4) Monitor database logs and application logs for unusual queries or access patterns indicative of injection attempts. 5) Isolate the grading system network segment to reduce exposure to external threats. 6) Educate administrators and users about the risk and signs of exploitation. 7) Prepare incident response plans specifically for potential data breaches involving student information. 8) Engage with the vendor or community to obtain or develop patches or updates addressing this vulnerability. These measures should be prioritized until an official patch is released.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-14T06:26:22.035Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68c7702239776bc2a147ddb0
Added to database: 9/15/2025, 1:47:14 AM
Last enriched: 9/15/2025, 2:02:20 AM
Last updated: 10/29/2025, 10:04:26 PM
Views: 50
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
AI Search Tools Easily Fooled by Fake Content
MediumDentsu Subsidiary Breached, Employee Data Stolen
MediumCVE-2025-9871: CWE-59: Improper Link Resolution Before File Access ('Link Following') in Razer Synapse 3
HighCVE-2025-9870: CWE-59: Improper Link Resolution Before File Access ('Link Following') in Razer Synapse 3
HighCVE-2025-11465: CWE-416: Use After Free in Ashlar-Vellum Cobalt
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.