Skip to main content

CVE-2025-10483: SQL Injection in SourceCodester Online Student File Management System

Medium
VulnerabilityCVE-2025-10483cvecve-2025-10483
Published: Mon Sep 15 2025 (09/15/2025, 22:32:07 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: Online Student File Management System

Description

A flaw has been found in SourceCodester Online Student File Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/save_user.php. This manipulation of the argument firstname causes sql injection. The attack is possible to be carried out remotely. The exploit has been published and may be used. Other parameters might be affected as well.

AI-Powered Analysis

AILast updated: 09/16/2025, 00:08:38 UTC

Technical Analysis

CVE-2025-10483 is a SQL Injection vulnerability identified in version 1.0 of the SourceCodester Online Student File Management System. The flaw exists in the /admin/save_user.php file, specifically through manipulation of the 'firstname' parameter, which allows an attacker to inject malicious SQL code. This vulnerability can be exploited remotely without requiring user interaction or authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The injection flaw potentially allows attackers to access or modify sensitive data stored in the backend database, compromise data integrity, or disrupt application availability. Although the CVSS score is moderate at 5.3, the vulnerability's impact on confidentiality, integrity, and availability is limited but non-negligible due to the partial scope and requirement of low privileges. The description also suggests that other parameters might be vulnerable, indicating a broader attack surface within the same endpoint. No official patches or fixes have been published yet, and no known exploits are reported in the wild, but proof-of-concept exploits have been made publicly available, increasing the risk of exploitation. The vulnerability affects only version 1.0 of the product, which is a niche student file management system, likely deployed in educational institutions or organizations managing student data.

Potential Impact

For European organizations, particularly educational institutions using the SourceCodester Online Student File Management System version 1.0, this vulnerability poses a risk of unauthorized data access or modification. Compromise of student records or administrative data could lead to privacy violations under GDPR, reputational damage, and potential regulatory penalties. The ability to perform SQL injection remotely without authentication increases the risk of automated attacks or exploitation by opportunistic threat actors. While the impact is medium severity, the exposure of sensitive student information or disruption of file management services could affect operational continuity and trust. Organizations relying on this system should be aware of the risk of data breaches and potential compliance issues arising from exploitation of this vulnerability.

Mitigation Recommendations

Since no official patch is currently available, European organizations should immediately conduct a thorough security review of their SourceCodester Online Student File Management System deployments. Specific mitigation steps include: 1) Implementing Web Application Firewall (WAF) rules to detect and block SQL injection attempts targeting the /admin/save_user.php endpoint, especially filtering suspicious input in the 'firstname' parameter and other related fields. 2) Restricting access to the administrative interface by IP whitelisting or VPN-only access to reduce exposure to remote attackers. 3) Applying input validation and sanitization at the application level to reject or properly escape malicious input before it reaches the database. 4) Monitoring logs for unusual database errors or suspicious activity indicative of injection attempts. 5) Planning for an upgrade or replacement of the vulnerable system with a more secure alternative or patched version once available. 6) Educating administrators about the risk and signs of exploitation to enable rapid incident response. These targeted mitigations go beyond generic advice by focusing on immediate protective controls and access restrictions tailored to the vulnerability's characteristics.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-15T14:01:36.436Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c8aa6cee2781683eebd52b

Added to database: 9/16/2025, 12:08:12 AM

Last enriched: 9/16/2025, 12:08:38 AM

Last updated: 9/19/2025, 3:30:01 PM

Views: 1

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats