CVE-2025-10596: SQL Injection in SourceCodester Online Exam Form Submission
A vulnerability was found in SourceCodester Online Exam Form Submission 1.0. This affects an unknown part of the file /index.php. The manipulation of the argument usn results in sql injection. The attack can be launched remotely. The exploit has been made public and could be used.
AI Analysis
Technical Summary
CVE-2025-10596 is a SQL Injection vulnerability identified in SourceCodester Online Exam Form Submission version 1.0. The vulnerability resides in the /index.php file, specifically in the handling of the 'usn' parameter. An attacker can manipulate this parameter to inject malicious SQL code, which the backend database executes. This flaw allows remote exploitation without requiring authentication or user interaction, making it accessible to any attacker with network access to the vulnerable application. The vulnerability has a CVSS 4.0 base score of 6.9, indicating a medium severity level. The attack vector is network-based with low attack complexity and no privileges or user interaction required. The impact on confidentiality, integrity, and availability is limited but present, as the vulnerability could allow partial data disclosure, modification, or deletion depending on the database permissions and application logic. Although no public exploits are currently known in the wild, the exploit code has been made public, increasing the risk of exploitation. The vulnerability affects only version 1.0 of the product, and no official patches or mitigations have been published yet. The SourceCodester Online Exam Form Submission is a web-based application used for managing online exam registrations and submissions, which typically involves sensitive student data and exam-related information.
Potential Impact
For European organizations, especially educational institutions and training providers using SourceCodester Online Exam Form Submission 1.0, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to student personal data, exam results, and registration details, potentially violating GDPR requirements for data protection and privacy. Data integrity could be compromised, affecting the reliability of exam records and results. Additionally, attackers might disrupt exam processes by modifying or deleting data, impacting availability and operational continuity. The medium severity rating suggests that while the vulnerability is not critical, it still represents a meaningful threat vector that could be leveraged for further attacks or data breaches. Given the sensitive nature of educational data and the regulatory environment in Europe, exploitation could result in legal penalties, reputational damage, and loss of trust among students and stakeholders.
Mitigation Recommendations
European organizations should immediately assess their exposure to SourceCodester Online Exam Form Submission version 1.0 and prioritize upgrading to a patched version once available. In the absence of an official patch, organizations should implement input validation and parameterized queries or prepared statements to sanitize the 'usn' parameter and any other user inputs interacting with the database. Web application firewalls (WAFs) should be configured to detect and block SQL injection attempts targeting the vulnerable parameter. Network segmentation and access controls should limit exposure of the application to trusted users and networks only. Regular security audits and penetration testing focused on injection flaws should be conducted. Additionally, monitoring and logging of database queries and web application activity can help detect exploitation attempts early. Organizations should also review and minimize database user privileges to reduce the impact of a successful injection attack. Finally, staff training on secure coding practices and awareness of injection vulnerabilities is recommended to prevent future occurrences.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-10596: SQL Injection in SourceCodester Online Exam Form Submission
Description
A vulnerability was found in SourceCodester Online Exam Form Submission 1.0. This affects an unknown part of the file /index.php. The manipulation of the argument usn results in sql injection. The attack can be launched remotely. The exploit has been made public and could be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-10596 is a SQL Injection vulnerability identified in SourceCodester Online Exam Form Submission version 1.0. The vulnerability resides in the /index.php file, specifically in the handling of the 'usn' parameter. An attacker can manipulate this parameter to inject malicious SQL code, which the backend database executes. This flaw allows remote exploitation without requiring authentication or user interaction, making it accessible to any attacker with network access to the vulnerable application. The vulnerability has a CVSS 4.0 base score of 6.9, indicating a medium severity level. The attack vector is network-based with low attack complexity and no privileges or user interaction required. The impact on confidentiality, integrity, and availability is limited but present, as the vulnerability could allow partial data disclosure, modification, or deletion depending on the database permissions and application logic. Although no public exploits are currently known in the wild, the exploit code has been made public, increasing the risk of exploitation. The vulnerability affects only version 1.0 of the product, and no official patches or mitigations have been published yet. The SourceCodester Online Exam Form Submission is a web-based application used for managing online exam registrations and submissions, which typically involves sensitive student data and exam-related information.
Potential Impact
For European organizations, especially educational institutions and training providers using SourceCodester Online Exam Form Submission 1.0, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to student personal data, exam results, and registration details, potentially violating GDPR requirements for data protection and privacy. Data integrity could be compromised, affecting the reliability of exam records and results. Additionally, attackers might disrupt exam processes by modifying or deleting data, impacting availability and operational continuity. The medium severity rating suggests that while the vulnerability is not critical, it still represents a meaningful threat vector that could be leveraged for further attacks or data breaches. Given the sensitive nature of educational data and the regulatory environment in Europe, exploitation could result in legal penalties, reputational damage, and loss of trust among students and stakeholders.
Mitigation Recommendations
European organizations should immediately assess their exposure to SourceCodester Online Exam Form Submission version 1.0 and prioritize upgrading to a patched version once available. In the absence of an official patch, organizations should implement input validation and parameterized queries or prepared statements to sanitize the 'usn' parameter and any other user inputs interacting with the database. Web application firewalls (WAFs) should be configured to detect and block SQL injection attempts targeting the vulnerable parameter. Network segmentation and access controls should limit exposure of the application to trusted users and networks only. Regular security audits and penetration testing focused on injection flaws should be conducted. Additionally, monitoring and logging of database queries and web application activity can help detect exploitation attempts early. Organizations should also review and minimize database user privileges to reduce the impact of a successful injection attack. Finally, staff training on secure coding practices and awareness of injection vulnerabilities is recommended to prevent future occurrences.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-17T06:22:19.893Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68cacea66b131705ffa8ffad
Added to database: 9/17/2025, 3:07:18 PM
Last enriched: 9/17/2025, 3:07:34 PM
Last updated: 10/30/2025, 11:34:30 AM
Views: 42
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-39663: CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in Checkmk GmbH Checkmk
HighCVE-2025-53883: CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in SUSE Container suse manager 5.0
Critical136 NPM Packages Delivering Infostealers Downloaded 100,000 Times
MediumCVE-2025-53880: CWE-35: Path Traversal in SUSE Container suse/manager/4.3/proxy-httpd:latest
HighCVE-2025-54941: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Apache Software Foundation Apache Airflow
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.