CVE-2025-10617: SQL Injection in SourceCodester Online Polling System
A weakness has been identified in SourceCodester Online Polling System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/positions.php. This manipulation of the argument ID causes sql injection. The attack may be initiated remotely. The exploit has been made available to the public and could be exploited.
AI Analysis
Technical Summary
CVE-2025-10617 is a SQL Injection vulnerability identified in SourceCodester Online Polling System version 1.0, specifically within the /admin/positions.php file. The vulnerability arises from improper sanitization or validation of the 'ID' parameter, which can be manipulated by an attacker to inject malicious SQL code. This injection flaw allows remote attackers to execute arbitrary SQL commands on the backend database without requiring authentication or user interaction. The vulnerability has a CVSS 4.0 base score of 5.3, indicating a medium severity level. The attack vector is network-based (AV:N), with low attack complexity (AC:L), and no privileges or user interaction needed (PR:L, UI:N). The impact on confidentiality, integrity, and availability is limited (VC:L, VI:L, VA:L), suggesting partial compromise potential rather than full system takeover. Although no public exploits are currently known in the wild, the exploit code has been made publicly available, increasing the risk of exploitation. The vulnerability affects only version 1.0 of the product, and no official patches or mitigations have been published yet. Given the nature of the product—an online polling system—successful exploitation could allow attackers to manipulate poll data, extract sensitive information, or disrupt polling operations, undermining trust and data integrity.
Potential Impact
For European organizations using SourceCodester Online Polling System 1.0, this vulnerability poses a moderate risk. Exploitation could lead to unauthorized access to polling data, manipulation of poll results, or leakage of sensitive voter information, potentially affecting the integrity and confidentiality of polling processes. This could have reputational consequences, especially for organizations conducting public opinion surveys, elections, or internal decision-making polls. Additionally, disruption of polling services could impact availability, causing operational delays. Given the remote exploitability without user interaction, attackers could automate attacks at scale, targeting multiple organizations. However, the limited scope of impact and absence of privilege escalation reduces the likelihood of full system compromise. Organizations relying on this software for critical or public-facing polling should be particularly cautious, as manipulated poll results could influence public perception or decision-making.
Mitigation Recommendations
Since no official patches are available, European organizations should implement immediate compensating controls. These include: 1) Restricting access to the /admin/positions.php endpoint via network-level controls such as IP whitelisting or VPN access to limit exposure; 2) Employing Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'ID' parameter; 3) Conducting thorough input validation and sanitization on all user-supplied parameters if source code access and modification are possible; 4) Monitoring logs for suspicious activity related to SQL injection attempts; 5) Considering temporary replacement or disabling of the vulnerable functionality if feasible; 6) Planning for an upgrade or migration to a patched or alternative polling system once available; 7) Educating administrators about the risks and signs of exploitation to enable rapid incident response.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-10617: SQL Injection in SourceCodester Online Polling System
Description
A weakness has been identified in SourceCodester Online Polling System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/positions.php. This manipulation of the argument ID causes sql injection. The attack may be initiated remotely. The exploit has been made available to the public and could be exploited.
AI-Powered Analysis
Technical Analysis
CVE-2025-10617 is a SQL Injection vulnerability identified in SourceCodester Online Polling System version 1.0, specifically within the /admin/positions.php file. The vulnerability arises from improper sanitization or validation of the 'ID' parameter, which can be manipulated by an attacker to inject malicious SQL code. This injection flaw allows remote attackers to execute arbitrary SQL commands on the backend database without requiring authentication or user interaction. The vulnerability has a CVSS 4.0 base score of 5.3, indicating a medium severity level. The attack vector is network-based (AV:N), with low attack complexity (AC:L), and no privileges or user interaction needed (PR:L, UI:N). The impact on confidentiality, integrity, and availability is limited (VC:L, VI:L, VA:L), suggesting partial compromise potential rather than full system takeover. Although no public exploits are currently known in the wild, the exploit code has been made publicly available, increasing the risk of exploitation. The vulnerability affects only version 1.0 of the product, and no official patches or mitigations have been published yet. Given the nature of the product—an online polling system—successful exploitation could allow attackers to manipulate poll data, extract sensitive information, or disrupt polling operations, undermining trust and data integrity.
Potential Impact
For European organizations using SourceCodester Online Polling System 1.0, this vulnerability poses a moderate risk. Exploitation could lead to unauthorized access to polling data, manipulation of poll results, or leakage of sensitive voter information, potentially affecting the integrity and confidentiality of polling processes. This could have reputational consequences, especially for organizations conducting public opinion surveys, elections, or internal decision-making polls. Additionally, disruption of polling services could impact availability, causing operational delays. Given the remote exploitability without user interaction, attackers could automate attacks at scale, targeting multiple organizations. However, the limited scope of impact and absence of privilege escalation reduces the likelihood of full system compromise. Organizations relying on this software for critical or public-facing polling should be particularly cautious, as manipulated poll results could influence public perception or decision-making.
Mitigation Recommendations
Since no official patches are available, European organizations should implement immediate compensating controls. These include: 1) Restricting access to the /admin/positions.php endpoint via network-level controls such as IP whitelisting or VPN access to limit exposure; 2) Employing Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'ID' parameter; 3) Conducting thorough input validation and sanitization on all user-supplied parameters if source code access and modification are possible; 4) Monitoring logs for suspicious activity related to SQL injection attempts; 5) Considering temporary replacement or disabling of the vulnerable functionality if feasible; 6) Planning for an upgrade or migration to a patched or alternative polling system once available; 7) Educating administrators about the risks and signs of exploitation to enable rapid incident response.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-17T11:19:48.595Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68cb1c55752de33ea51cfe55
Added to database: 9/17/2025, 8:38:45 PM
Last enriched: 9/17/2025, 8:42:11 PM
Last updated: 9/17/2025, 9:37:28 PM
Views: 3
Related Threats
CVE-2025-10619: OS Command Injection in sequa-ai sequa-mcp
MediumCVE-2025-10618: SQL Injection in itsourcecode Online Clinic Management System
MediumCVE-2025-8006: CWE-125: Out-of-bounds Read in Ashlar-Vellum Cobalt
HighCVE-2025-8005: CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') in Ashlar-Vellum Cobalt
HighCVE-2025-8004: CWE-125: Out-of-bounds Read in Ashlar-Vellum Cobalt
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.