CVE-2025-10613: SQL Injection in itsourcecode Student Information System
A vulnerability has been found in itsourcecode Student Information System 1.0. The affected element is an unknown function of the file /leveledit1.php. Such manipulation of the argument level_id leads to sql injection. The attack may be performed from remote. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-10613 is a SQL Injection vulnerability identified in version 1.0 of the itsourcecode Student Information System, specifically within an unspecified function in the /leveledit1.php file. The vulnerability arises from improper sanitization or validation of the 'level_id' parameter, allowing an attacker to inject malicious SQL code remotely without requiring user interaction or authentication. This flaw enables an attacker to manipulate backend database queries, potentially leading to unauthorized data access, data modification, or even complete compromise of the database. The CVSS 4.0 vector indicates the attack can be performed remotely (AV:N) with low attack complexity (AC:L), no privileges required (PR:L - low privileges), and no user interaction (UI:N). The impact on confidentiality, integrity, and availability is low individually but combined can lead to significant data exposure or disruption. Although no known exploits are currently observed in the wild, the public disclosure of the exploit increases the risk of exploitation. The vulnerability affects only version 1.0 of the product, and no patches have been published yet. Given the nature of Student Information Systems, which typically store sensitive student data including personal information, grades, and attendance records, exploitation could lead to privacy breaches and data integrity issues.
Potential Impact
For European organizations, particularly educational institutions using the itsourcecode Student Information System version 1.0, this vulnerability poses a moderate risk. Exploitation could result in unauthorized access to sensitive student data, violating GDPR and other data protection regulations, potentially leading to legal penalties and reputational damage. The integrity of academic records could be compromised, affecting student evaluations and institutional credibility. Availability impacts could disrupt administrative operations. Since the vulnerability requires only low privileges and no user interaction, attackers could automate exploitation attempts, increasing the threat level. The medium CVSS score reflects the moderate but tangible risk to confidentiality and integrity. Institutions relying on this software without timely mitigation may face data breaches and operational disruptions.
Mitigation Recommendations
European organizations should immediately audit their use of the itsourcecode Student Information System to determine if version 1.0 is deployed. If so, they should restrict external access to the /leveledit1.php endpoint via network-level controls such as firewalls or web application firewalls (WAF) with SQL injection detection rules. Implement strict input validation and parameterized queries or prepared statements in the application code to prevent SQL injection. Until an official patch is released, consider isolating the affected system from the internet or limiting access to trusted internal networks only. Regularly monitor logs for suspicious activity targeting the 'level_id' parameter. Conduct security assessments and penetration testing focused on injection flaws. Additionally, ensure backups of critical data are up to date and tested for restoration to mitigate potential data loss or corruption. Organizations should also prepare incident response plans tailored to data breaches involving student information.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-10613: SQL Injection in itsourcecode Student Information System
Description
A vulnerability has been found in itsourcecode Student Information System 1.0. The affected element is an unknown function of the file /leveledit1.php. Such manipulation of the argument level_id leads to sql injection. The attack may be performed from remote. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-10613 is a SQL Injection vulnerability identified in version 1.0 of the itsourcecode Student Information System, specifically within an unspecified function in the /leveledit1.php file. The vulnerability arises from improper sanitization or validation of the 'level_id' parameter, allowing an attacker to inject malicious SQL code remotely without requiring user interaction or authentication. This flaw enables an attacker to manipulate backend database queries, potentially leading to unauthorized data access, data modification, or even complete compromise of the database. The CVSS 4.0 vector indicates the attack can be performed remotely (AV:N) with low attack complexity (AC:L), no privileges required (PR:L - low privileges), and no user interaction (UI:N). The impact on confidentiality, integrity, and availability is low individually but combined can lead to significant data exposure or disruption. Although no known exploits are currently observed in the wild, the public disclosure of the exploit increases the risk of exploitation. The vulnerability affects only version 1.0 of the product, and no patches have been published yet. Given the nature of Student Information Systems, which typically store sensitive student data including personal information, grades, and attendance records, exploitation could lead to privacy breaches and data integrity issues.
Potential Impact
For European organizations, particularly educational institutions using the itsourcecode Student Information System version 1.0, this vulnerability poses a moderate risk. Exploitation could result in unauthorized access to sensitive student data, violating GDPR and other data protection regulations, potentially leading to legal penalties and reputational damage. The integrity of academic records could be compromised, affecting student evaluations and institutional credibility. Availability impacts could disrupt administrative operations. Since the vulnerability requires only low privileges and no user interaction, attackers could automate exploitation attempts, increasing the threat level. The medium CVSS score reflects the moderate but tangible risk to confidentiality and integrity. Institutions relying on this software without timely mitigation may face data breaches and operational disruptions.
Mitigation Recommendations
European organizations should immediately audit their use of the itsourcecode Student Information System to determine if version 1.0 is deployed. If so, they should restrict external access to the /leveledit1.php endpoint via network-level controls such as firewalls or web application firewalls (WAF) with SQL injection detection rules. Implement strict input validation and parameterized queries or prepared statements in the application code to prevent SQL injection. Until an official patch is released, consider isolating the affected system from the internet or limiting access to trusted internal networks only. Regularly monitor logs for suspicious activity targeting the 'level_id' parameter. Conduct security assessments and penetration testing focused on injection flaws. Additionally, ensure backups of critical data are up to date and tested for restoration to mitigate potential data loss or corruption. Organizations should also prepare incident response plans tailored to data breaches involving student information.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-17T11:11:17.854Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68cb06d7ab9d7384897e2e28
Added to database: 9/17/2025, 7:07:03 PM
Last enriched: 9/17/2025, 7:07:32 PM
Last updated: 9/19/2025, 5:08:26 AM
Views: 9
Related Threats
CVE-2025-10719: CWE-639 Authorization Bypass Through User-Controlled Key in WisdomGarden Tronclass
MediumCVE-2025-8531: CWE-130 Improper Handling of Length Parameter Inconsistency in Mitsubishi Electric Corporation MELSEC-Q Series Q03UDVCPU
MediumWatchGuard Issues Fix for 9.3-Rated Firebox Firewall Vulnerability
MediumCVE-2025-9906: CWE-502 Deserialization of Untrusted Data in Keras-team Keras
HighCVE-2025-9905: CWE-913 Improper Control of Dynamically-Managed Code Resources in Keras-team Keras
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.