CVE-2025-10597: SQL Injection in kidaze CourseSelectionSystem
A vulnerability was determined in kidaze CourseSelectionSystem up to 42cd892b40a18d50bd4ed1905fa89f939173a464. This vulnerability affects unknown code of the file /Profilers/PriProfile/COUNT2.php. This manipulation of the argument cname causes sql injection. The attack may be initiated remotely. This product uses a rolling release model to deliver continuous updates. As a result, specific version information for affected or updated releases is not available.
AI Analysis
Technical Summary
CVE-2025-10597 is a SQL Injection vulnerability identified in the kidaze CourseSelectionSystem, specifically affecting the code within the /Profilers/PriProfile/COUNT2.php file. The vulnerability arises from improper sanitization or validation of the 'cname' parameter, which can be manipulated by an attacker to inject malicious SQL commands. This injection flaw allows an unauthenticated remote attacker to execute arbitrary SQL queries on the backend database without requiring any user interaction or privileges. The product follows a rolling release model, making it difficult to pinpoint exact affected versions beyond the identified commit hash (42cd892b40a18d50bd4ed1905fa89f939173a464). The CVSS 4.0 base score is 6.9 (medium severity), reflecting the network attack vector, low attack complexity, no privileges or user interaction needed, and limited impact on confidentiality, integrity, and availability. Exploiting this vulnerability could enable attackers to read, modify, or delete sensitive data stored in the database, potentially leading to data breaches or unauthorized system manipulation. However, no known exploits are currently reported in the wild, indicating either recent discovery or limited public exploitation. The vulnerability's presence in a course selection system suggests that educational institutions or organizations using this software could be targeted, with risks including exposure of student data, academic records, or administrative information.
Potential Impact
For European organizations, particularly educational institutions such as universities and colleges that utilize the kidaze CourseSelectionSystem, this vulnerability poses a significant risk to the confidentiality and integrity of student and administrative data. Successful exploitation could lead to unauthorized disclosure of personal information, manipulation of course enrollment data, or disruption of academic processes. Given the sensitivity of educational records under regulations like GDPR, any data breach could result in regulatory penalties and reputational damage. Additionally, the ability to execute arbitrary SQL commands could be leveraged to pivot attacks within the network, potentially compromising other connected systems. The medium severity rating suggests that while the vulnerability is exploitable remotely without authentication, the overall impact is somewhat limited, possibly due to the scope of accessible data or existing compensating controls. Nonetheless, the threat is non-trivial and warrants prompt attention to prevent data breaches and maintain operational integrity.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately audit and sanitize all inputs, especially the 'cname' parameter in the /Profilers/PriProfile/COUNT2.php file, to ensure proper validation and escaping of SQL commands. Implementing parameterized queries or prepared statements is critical to prevent SQL injection attacks. Since the product uses a rolling release model, organizations should monitor vendor updates closely and apply patches or updates as soon as they become available. In the absence of official patches, deploying Web Application Firewalls (WAFs) with rules targeting SQL injection patterns can provide a temporary protective layer. Regular security assessments and code reviews focusing on input validation should be conducted to identify and remediate similar vulnerabilities. Additionally, restricting database user permissions to the minimum necessary can limit the potential damage from exploitation. Logging and monitoring database queries for unusual activity can help detect exploitation attempts early. Finally, educating developers and administrators about secure coding practices and the risks of SQL injection will help prevent future occurrences.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Poland
CVE-2025-10597: SQL Injection in kidaze CourseSelectionSystem
Description
A vulnerability was determined in kidaze CourseSelectionSystem up to 42cd892b40a18d50bd4ed1905fa89f939173a464. This vulnerability affects unknown code of the file /Profilers/PriProfile/COUNT2.php. This manipulation of the argument cname causes sql injection. The attack may be initiated remotely. This product uses a rolling release model to deliver continuous updates. As a result, specific version information for affected or updated releases is not available.
AI-Powered Analysis
Technical Analysis
CVE-2025-10597 is a SQL Injection vulnerability identified in the kidaze CourseSelectionSystem, specifically affecting the code within the /Profilers/PriProfile/COUNT2.php file. The vulnerability arises from improper sanitization or validation of the 'cname' parameter, which can be manipulated by an attacker to inject malicious SQL commands. This injection flaw allows an unauthenticated remote attacker to execute arbitrary SQL queries on the backend database without requiring any user interaction or privileges. The product follows a rolling release model, making it difficult to pinpoint exact affected versions beyond the identified commit hash (42cd892b40a18d50bd4ed1905fa89f939173a464). The CVSS 4.0 base score is 6.9 (medium severity), reflecting the network attack vector, low attack complexity, no privileges or user interaction needed, and limited impact on confidentiality, integrity, and availability. Exploiting this vulnerability could enable attackers to read, modify, or delete sensitive data stored in the database, potentially leading to data breaches or unauthorized system manipulation. However, no known exploits are currently reported in the wild, indicating either recent discovery or limited public exploitation. The vulnerability's presence in a course selection system suggests that educational institutions or organizations using this software could be targeted, with risks including exposure of student data, academic records, or administrative information.
Potential Impact
For European organizations, particularly educational institutions such as universities and colleges that utilize the kidaze CourseSelectionSystem, this vulnerability poses a significant risk to the confidentiality and integrity of student and administrative data. Successful exploitation could lead to unauthorized disclosure of personal information, manipulation of course enrollment data, or disruption of academic processes. Given the sensitivity of educational records under regulations like GDPR, any data breach could result in regulatory penalties and reputational damage. Additionally, the ability to execute arbitrary SQL commands could be leveraged to pivot attacks within the network, potentially compromising other connected systems. The medium severity rating suggests that while the vulnerability is exploitable remotely without authentication, the overall impact is somewhat limited, possibly due to the scope of accessible data or existing compensating controls. Nonetheless, the threat is non-trivial and warrants prompt attention to prevent data breaches and maintain operational integrity.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately audit and sanitize all inputs, especially the 'cname' parameter in the /Profilers/PriProfile/COUNT2.php file, to ensure proper validation and escaping of SQL commands. Implementing parameterized queries or prepared statements is critical to prevent SQL injection attacks. Since the product uses a rolling release model, organizations should monitor vendor updates closely and apply patches or updates as soon as they become available. In the absence of official patches, deploying Web Application Firewalls (WAFs) with rules targeting SQL injection patterns can provide a temporary protective layer. Regular security assessments and code reviews focusing on input validation should be conducted to identify and remediate similar vulnerabilities. Additionally, restricting database user permissions to the minimum necessary can limit the potential damage from exploitation. Logging and monitoring database queries for unusual activity can help detect exploitation attempts early. Finally, educating developers and administrators about secure coding practices and the risks of SQL injection will help prevent future occurrences.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-17T06:24:01.055Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68caf4a946aca7f3592e4647
Added to database: 9/17/2025, 5:49:29 PM
Last enriched: 9/17/2025, 5:49:44 PM
Last updated: 9/17/2025, 5:50:00 PM
Views: 2
Related Threats
CVE-2025-10604: SQL Injection in PHPGurukul Online Discussion Forum
MediumCVE-2025-59352: CWE-202: Exposure of Sensitive Information Through Data Queries in dragonflyoss dragonfly
MediumCVE-2025-59349: CWE-732: Incorrect Permission Assignment for Critical Resource in dragonflyoss dragonfly
LowCVE-2025-59345: CWE-306: Missing Authentication for Critical Function in dragonflyoss dragonfly
LowCVE-2025-59348: CWE-457: Use of Uninitialized Variable in dragonflyoss dragonfly
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.