Skip to main content

CVE-2025-10430: SQL Injection in SourceCodester Pet Grooming Management Software

Medium
VulnerabilityCVE-2025-10430cvecve-2025-10430
Published: Mon Sep 15 2025 (09/15/2025, 06:32:10 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: Pet Grooming Management Software

Description

A flaw has been found in SourceCodester Pet Grooming Management Software 1.0. Affected by this issue is some unknown functionality of the file /admin/barcode.php. This manipulation of the argument ID causes sql injection. The attack may be initiated remotely. The exploit has been published and may be used.

AI-Powered Analysis

AILast updated: 09/15/2025, 06:48:03 UTC

Technical Analysis

CVE-2025-10430 is a medium-severity SQL Injection vulnerability identified in SourceCodester Pet Grooming Management Software version 1.0. The vulnerability exists in an unspecified functionality within the /admin/barcode.php file, where manipulation of the 'ID' parameter allows an attacker to inject malicious SQL code. This flaw enables remote exploitation without requiring user interaction or authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The vulnerability impacts confidentiality, integrity, and availability at a limited scope (VC:L/VI:L/VA:L), meaning the attacker can partially compromise the database contents or functionality. The vulnerability has been publicly disclosed, but no known exploits are currently observed in the wild. The lack of available patches or mitigations from the vendor increases the risk for organizations using this software. SQL Injection vulnerabilities typically allow attackers to extract sensitive data, modify or delete records, or execute administrative operations on the database, potentially leading to data breaches or service disruption. Given the software is targeted at pet grooming management, the database likely contains customer information, appointment details, and possibly payment data, which could be exposed or altered by an attacker.

Potential Impact

For European organizations using SourceCodester Pet Grooming Management Software 1.0, this vulnerability poses a tangible risk to the confidentiality and integrity of customer and business data. Exploitation could lead to unauthorized access to personal data of clients, violating GDPR requirements and resulting in regulatory penalties. Data manipulation could disrupt business operations, causing appointment scheduling errors or financial discrepancies. The remote and unauthenticated nature of the attack vector increases the likelihood of exploitation, especially if the software is exposed to the internet or accessible from less secure internal networks. Small and medium-sized enterprises (SMEs) in the pet grooming sector, which may lack dedicated cybersecurity resources, are particularly vulnerable. The absence of known exploits in the wild currently reduces immediate risk, but the public disclosure and availability of exploit details could lead to rapid weaponization by threat actors.

Mitigation Recommendations

Organizations should immediately audit their use of SourceCodester Pet Grooming Management Software 1.0 and restrict access to the /admin/barcode.php endpoint to trusted internal networks only. Implement web application firewalls (WAFs) with rules designed to detect and block SQL Injection attempts targeting the 'ID' parameter. Conduct input validation and parameterized queries within the application code to prevent injection attacks; if source code access is available, developers should remediate the vulnerable code promptly. In the absence of vendor patches, consider isolating the application behind VPNs or network segmentation to reduce exposure. Regularly monitor logs for suspicious database queries or unusual access patterns. Additionally, ensure backups of critical data are maintained securely to enable recovery in case of data corruption or deletion. Engage with the vendor for updates or patches and subscribe to vulnerability advisories for timely information.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-14T10:16:14.962Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c7b690fabac0897cd1be92

Added to database: 9/15/2025, 6:47:44 AM

Last enriched: 9/15/2025, 6:48:03 AM

Last updated: 9/15/2025, 8:34:31 AM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats