Skip to main content

CVE-2025-10596: SQL Injection in SourceCodester Online Exam Form Submission

Medium
VulnerabilityCVE-2025-10596cvecve-2025-10596
Published: Wed Sep 17 2025 (09/17/2025, 15:02:06 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: Online Exam Form Submission

Description

A vulnerability was found in SourceCodester Online Exam Form Submission 1.0. This affects an unknown part of the file /index.php. The manipulation of the argument usn results in sql injection. The attack can be launched remotely. The exploit has been made public and could be used.

AI-Powered Analysis

AILast updated: 09/17/2025, 15:07:34 UTC

Technical Analysis

CVE-2025-10596 is a SQL Injection vulnerability identified in SourceCodester Online Exam Form Submission version 1.0. The vulnerability resides in the /index.php file, specifically in the handling of the 'usn' parameter. An attacker can manipulate this parameter to inject malicious SQL code, which the backend database executes. This flaw allows remote exploitation without requiring authentication or user interaction, making it accessible to any attacker with network access to the vulnerable application. The vulnerability has a CVSS 4.0 base score of 6.9, indicating a medium severity level. The attack vector is network-based with low attack complexity and no privileges or user interaction required. The impact on confidentiality, integrity, and availability is limited but present, as the vulnerability could allow partial data disclosure, modification, or deletion depending on the database permissions and application logic. Although no public exploits are currently known in the wild, the exploit code has been made public, increasing the risk of exploitation. The vulnerability affects only version 1.0 of the product, and no official patches or mitigations have been published yet. The SourceCodester Online Exam Form Submission is a web-based application used for managing online exam registrations and submissions, which typically involves sensitive student data and exam-related information.

Potential Impact

For European organizations, especially educational institutions and training providers using SourceCodester Online Exam Form Submission 1.0, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to student personal data, exam results, and registration details, potentially violating GDPR requirements for data protection and privacy. Data integrity could be compromised, affecting the reliability of exam records and results. Additionally, attackers might disrupt exam processes by modifying or deleting data, impacting availability and operational continuity. The medium severity rating suggests that while the vulnerability is not critical, it still represents a meaningful threat vector that could be leveraged for further attacks or data breaches. Given the sensitive nature of educational data and the regulatory environment in Europe, exploitation could result in legal penalties, reputational damage, and loss of trust among students and stakeholders.

Mitigation Recommendations

European organizations should immediately assess their exposure to SourceCodester Online Exam Form Submission version 1.0 and prioritize upgrading to a patched version once available. In the absence of an official patch, organizations should implement input validation and parameterized queries or prepared statements to sanitize the 'usn' parameter and any other user inputs interacting with the database. Web application firewalls (WAFs) should be configured to detect and block SQL injection attempts targeting the vulnerable parameter. Network segmentation and access controls should limit exposure of the application to trusted users and networks only. Regular security audits and penetration testing focused on injection flaws should be conducted. Additionally, monitoring and logging of database queries and web application activity can help detect exploitation attempts early. Organizations should also review and minimize database user privileges to reduce the impact of a successful injection attack. Finally, staff training on secure coding practices and awareness of injection vulnerabilities is recommended to prevent future occurrences.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-17T06:22:19.893Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68cacea66b131705ffa8ffad

Added to database: 9/17/2025, 3:07:18 PM

Last enriched: 9/17/2025, 3:07:34 PM

Last updated: 9/17/2025, 3:16:44 PM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats