CVE-2025-10601: SQL Injection in SourceCodester Online Exam Form Submission
A vulnerability has been found in SourceCodester Online Exam Form Submission 1.0. Affected is an unknown function of the file /admin/index.php. Such manipulation of the argument email leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-10601 is a SQL Injection vulnerability identified in SourceCodester Online Exam Form Submission version 1.0. The vulnerability exists in an unspecified function within the /admin/index.php file, where the 'email' parameter is improperly sanitized or validated, allowing an attacker to inject malicious SQL code. This flaw enables remote exploitation without requiring authentication or user interaction, as the attack vector is through a network request manipulating the email argument. The vulnerability can lead to unauthorized access to the backend database, potentially exposing sensitive data, modifying or deleting records, or escalating privileges within the application. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the network attack vector, low complexity, no privileges or user interaction needed, but limited impact on confidentiality, integrity, and availability. Although no known exploits are currently observed in the wild, the public disclosure of the exploit code increases the risk of active exploitation. The vulnerability affects only version 1.0 of the product, which is a niche online exam form submission system, typically used by educational institutions or training providers to manage exam registrations and submissions.
Potential Impact
For European organizations, especially educational institutions, training centers, and certification bodies using SourceCodester Online Exam Form Submission 1.0, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to personal data of students or candidates, including emails and potentially other sensitive information stored in the database. This could result in data breaches violating GDPR regulations, leading to legal and financial penalties. Additionally, attackers could manipulate exam submission data, undermining the integrity of exam results and damaging institutional reputation. The ability to execute SQL injection remotely without authentication increases the attack surface, making it easier for threat actors to target vulnerable deployments. Although the product is specialized and may have limited deployment, any affected organization in Europe faces risks to confidentiality, data integrity, and availability of exam services.
Mitigation Recommendations
Organizations should immediately assess their use of SourceCodester Online Exam Form Submission version 1.0 and prioritize upgrading to a patched version once available. In the absence of an official patch, implement input validation and parameterized queries or prepared statements to sanitize the 'email' parameter and any other user inputs in /admin/index.php. Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the email parameter. Conduct thorough code reviews and penetration testing focusing on injection flaws. Restrict access to the admin interface by IP whitelisting or VPN to reduce exposure. Monitor logs for suspicious queries or repeated failed attempts to exploit the injection. Backup databases regularly and ensure incident response plans are updated to handle potential data breaches. Finally, educate administrators about the risks and signs of SQL injection attacks.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-10601: SQL Injection in SourceCodester Online Exam Form Submission
Description
A vulnerability has been found in SourceCodester Online Exam Form Submission 1.0. Affected is an unknown function of the file /admin/index.php. Such manipulation of the argument email leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-10601 is a SQL Injection vulnerability identified in SourceCodester Online Exam Form Submission version 1.0. The vulnerability exists in an unspecified function within the /admin/index.php file, where the 'email' parameter is improperly sanitized or validated, allowing an attacker to inject malicious SQL code. This flaw enables remote exploitation without requiring authentication or user interaction, as the attack vector is through a network request manipulating the email argument. The vulnerability can lead to unauthorized access to the backend database, potentially exposing sensitive data, modifying or deleting records, or escalating privileges within the application. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the network attack vector, low complexity, no privileges or user interaction needed, but limited impact on confidentiality, integrity, and availability. Although no known exploits are currently observed in the wild, the public disclosure of the exploit code increases the risk of active exploitation. The vulnerability affects only version 1.0 of the product, which is a niche online exam form submission system, typically used by educational institutions or training providers to manage exam registrations and submissions.
Potential Impact
For European organizations, especially educational institutions, training centers, and certification bodies using SourceCodester Online Exam Form Submission 1.0, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to personal data of students or candidates, including emails and potentially other sensitive information stored in the database. This could result in data breaches violating GDPR regulations, leading to legal and financial penalties. Additionally, attackers could manipulate exam submission data, undermining the integrity of exam results and damaging institutional reputation. The ability to execute SQL injection remotely without authentication increases the attack surface, making it easier for threat actors to target vulnerable deployments. Although the product is specialized and may have limited deployment, any affected organization in Europe faces risks to confidentiality, data integrity, and availability of exam services.
Mitigation Recommendations
Organizations should immediately assess their use of SourceCodester Online Exam Form Submission version 1.0 and prioritize upgrading to a patched version once available. In the absence of an official patch, implement input validation and parameterized queries or prepared statements to sanitize the 'email' parameter and any other user inputs in /admin/index.php. Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the email parameter. Conduct thorough code reviews and penetration testing focusing on injection flaws. Restrict access to the admin interface by IP whitelisting or VPN to reduce exposure. Monitor logs for suspicious queries or repeated failed attempts to exploit the injection. Backup databases regularly and ensure incident response plans are updated to handle potential data breaches. Finally, educate administrators about the risks and signs of SQL injection attacks.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-17T06:46:26.622Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68cae414bbadf27e02c744d3
Added to database: 9/17/2025, 4:38:44 PM
Last enriched: 9/17/2025, 4:38:59 PM
Last updated: 9/17/2025, 4:39:20 PM
Views: 2
Related Threats
CVE-2025-58431: CWE-250: Execution with Unnecessary Privileges in IceWhaleTech ZimaOS
MediumCVE-2025-10603: SQL Injection in PHPGurukul Online Discussion Forum
MediumCVE-2025-10602: SQL Injection in SourceCodester Online Exam Form Submission
MediumCVE-2025-35436: CWE-248 Uncaught Exception in CISA Thorium
MediumCVE-2025-35435: CWE-369 Divide By Zero in CISA Thorium
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.