Skip to main content

CVE-2025-10594: SQL Injection in SourceCodester Online Student File Management System

Medium
VulnerabilityCVE-2025-10594cvecve-2025-10594
Published: Wed Sep 17 2025 (09/17/2025, 14:02:08 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: Online Student File Management System

Description

A flaw has been found in SourceCodester Online Student File Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/delete_student.php. Executing manipulation of the argument stud_id can lead to sql injection. It is possible to launch the attack remotely. The exploit has been published and may be used.

AI-Powered Analysis

AILast updated: 09/17/2025, 14:08:22 UTC

Technical Analysis

CVE-2025-10594 is a medium-severity SQL injection vulnerability identified in version 1.0 of the SourceCodester Online Student File Management System. The vulnerability exists in the /admin/delete_student.php script, specifically in the handling of the stud_id parameter. Improper sanitization or validation of this input allows an attacker to inject malicious SQL code, potentially manipulating the backend database. This flaw can be exploited remotely without requiring user interaction or prior authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The vulnerability impacts confidentiality, integrity, and availability of the system to a limited extent (VC:L/VI:L/VA:L), meaning that an attacker could read, modify, or delete data, but with some constraints. The exploit code has been published, increasing the risk of exploitation, although no confirmed active exploitation in the wild has been reported yet. The vulnerability affects only version 1.0 of the product, which is a niche student file management system likely used by educational institutions to manage student records and files. Given the nature of the vulnerability, an attacker could delete or alter student records, extract sensitive student information, or disrupt system operations, potentially causing operational and reputational damage to affected organizations.

Potential Impact

For European organizations, particularly educational institutions using the SourceCodester Online Student File Management System version 1.0, this vulnerability poses a significant risk to the confidentiality and integrity of student data. Exploitation could lead to unauthorized disclosure of personal data protected under GDPR, resulting in legal and financial penalties. Integrity violations could disrupt academic records, affecting student progression and institutional trust. Availability impacts, while limited, could cause temporary denial of service or data loss. The remote and unauthenticated nature of the exploit increases the threat surface, especially for institutions with publicly accessible admin interfaces. The medium CVSS score reflects moderate risk, but the presence of published exploit code elevates urgency for mitigation. Organizations may also face reputational damage and loss of stakeholder confidence if breaches occur. Additionally, given the sensitivity of educational data, regulatory scrutiny in Europe is likely to be stringent.

Mitigation Recommendations

1. Immediate application of patches or updates from the vendor once available is critical; since no patch links are provided, organizations should contact SourceCodester for official fixes. 2. In the interim, restrict access to the /admin/delete_student.php endpoint by implementing network-level controls such as IP whitelisting or VPN-only access to the admin panel. 3. Employ web application firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the stud_id parameter. 4. Conduct thorough input validation and sanitization on all parameters, especially stud_id, to prevent injection attacks. 5. Review and harden database permissions to limit the impact of potential SQL injection, ensuring the application uses least privilege principles. 6. Monitor logs for suspicious activity related to the delete_student.php script, including unusual queries or repeated access attempts. 7. Educate administrative users about the risks and encourage strong authentication methods, even though the vulnerability does not require authentication, to reduce overall attack surface. 8. Consider deploying intrusion detection systems (IDS) tuned for SQL injection signatures. 9. Regularly back up student data and verify backup integrity to enable recovery in case of data tampering or loss.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-17T05:58:42.510Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68cac0c598f27b6b4d5b469c

Added to database: 9/17/2025, 2:08:05 PM

Last enriched: 9/17/2025, 2:08:22 PM

Last updated: 9/19/2025, 12:08:58 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats