Skip to main content

CVE-2025-10613: SQL Injection in itsourcecode Student Information System

Medium
VulnerabilityCVE-2025-10613cvecve-2025-10613
Published: Wed Sep 17 2025 (09/17/2025, 19:02:06 UTC)
Source: CVE Database V5
Vendor/Project: itsourcecode
Product: Student Information System

Description

A vulnerability has been found in itsourcecode Student Information System 1.0. The affected element is an unknown function of the file /leveledit1.php. Such manipulation of the argument level_id leads to sql injection. The attack may be performed from remote. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 09/17/2025, 19:07:32 UTC

Technical Analysis

CVE-2025-10613 is a SQL Injection vulnerability identified in version 1.0 of the itsourcecode Student Information System, specifically within an unspecified function in the /leveledit1.php file. The vulnerability arises from improper sanitization or validation of the 'level_id' parameter, allowing an attacker to inject malicious SQL code remotely without requiring user interaction or authentication. This flaw enables an attacker to manipulate backend database queries, potentially leading to unauthorized data access, data modification, or even complete compromise of the database. The CVSS 4.0 vector indicates the attack can be performed remotely (AV:N) with low attack complexity (AC:L), no privileges required (PR:L - low privileges), and no user interaction (UI:N). The impact on confidentiality, integrity, and availability is low individually but combined can lead to significant data exposure or disruption. Although no known exploits are currently observed in the wild, the public disclosure of the exploit increases the risk of exploitation. The vulnerability affects only version 1.0 of the product, and no patches have been published yet. Given the nature of Student Information Systems, which typically store sensitive student data including personal information, grades, and attendance records, exploitation could lead to privacy breaches and data integrity issues.

Potential Impact

For European organizations, particularly educational institutions using the itsourcecode Student Information System version 1.0, this vulnerability poses a moderate risk. Exploitation could result in unauthorized access to sensitive student data, violating GDPR and other data protection regulations, potentially leading to legal penalties and reputational damage. The integrity of academic records could be compromised, affecting student evaluations and institutional credibility. Availability impacts could disrupt administrative operations. Since the vulnerability requires only low privileges and no user interaction, attackers could automate exploitation attempts, increasing the threat level. The medium CVSS score reflects the moderate but tangible risk to confidentiality and integrity. Institutions relying on this software without timely mitigation may face data breaches and operational disruptions.

Mitigation Recommendations

European organizations should immediately audit their use of the itsourcecode Student Information System to determine if version 1.0 is deployed. If so, they should restrict external access to the /leveledit1.php endpoint via network-level controls such as firewalls or web application firewalls (WAF) with SQL injection detection rules. Implement strict input validation and parameterized queries or prepared statements in the application code to prevent SQL injection. Until an official patch is released, consider isolating the affected system from the internet or limiting access to trusted internal networks only. Regularly monitor logs for suspicious activity targeting the 'level_id' parameter. Conduct security assessments and penetration testing focused on injection flaws. Additionally, ensure backups of critical data are up to date and tested for restoration to mitigate potential data loss or corruption. Organizations should also prepare incident response plans tailored to data breaches involving student information.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-17T11:11:17.854Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68cb06d7ab9d7384897e2e28

Added to database: 9/17/2025, 7:07:03 PM

Last enriched: 9/17/2025, 7:07:32 PM

Last updated: 9/19/2025, 5:08:26 AM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats