Skip to main content

CVE-2025-10626: SQL Injection in SourceCodester Online Exam Form Submission

Medium
VulnerabilityCVE-2025-10626cvecve-2025-10626
Published: Wed Sep 17 2025 (09/17/2025, 23:32:06 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: Online Exam Form Submission

Description

A flaw has been found in SourceCodester Online Exam Form Submission 1.0. Affected by this issue is some unknown functionality of the file /admin/update_s3.php. This manipulation of the argument credits causes sql injection. Remote exploitation of the attack is possible. The exploit has been published and may be used.

AI-Powered Analysis

AILast updated: 09/17/2025, 23:38:44 UTC

Technical Analysis

CVE-2025-10626 is a medium-severity SQL Injection vulnerability identified in SourceCodester Online Exam Form Submission version 1.0. The vulnerability exists in the /admin/update_s3.php script, specifically through the manipulation of the 'credits' parameter. This flaw allows an unauthenticated remote attacker to inject malicious SQL code due to insufficient input validation or sanitization of this parameter. The vulnerability does not require user interaction or authentication, and the attack vector is network-based, making it accessible remotely. Exploiting this vulnerability could enable an attacker to execute arbitrary SQL commands on the backend database, potentially leading to unauthorized data disclosure, data modification, or even deletion. The CVSS 4.0 vector indicates low complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and partial impacts on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although no public exploit is currently known to be in the wild, the exploit code has been published, increasing the risk of exploitation. The vulnerability affects only version 1.0 of the product, which is a niche online exam management system, typically used by educational institutions or training organizations to manage exam form submissions. The lack of available patches or mitigations from the vendor at the time of publication increases the urgency for affected organizations to implement compensating controls.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for educational institutions, certification bodies, and training providers that rely on SourceCodester Online Exam Form Submission 1.0. Successful exploitation could lead to unauthorized access to sensitive student or candidate data, including personal information and exam results, violating data protection regulations such as GDPR. Data integrity could be compromised, potentially allowing attackers to alter exam submissions or results, undermining the credibility of certification processes. Availability could also be affected if attackers execute destructive SQL commands, causing service disruptions. Given the remote exploitability without authentication, attackers could target multiple institutions en masse, leading to widespread data breaches or operational disruptions. The medium CVSS score reflects moderate risk, but the presence of published exploit code elevates the threat level. Organizations in Europe must consider the reputational damage, regulatory fines, and operational impact that could arise from exploitation of this vulnerability.

Mitigation Recommendations

Since no official patch is currently available, European organizations should implement immediate compensating controls. First, restrict access to the /admin/update_s3.php endpoint by IP whitelisting or VPN access to limit exposure to trusted administrators only. Implement web application firewall (WAF) rules to detect and block SQL injection patterns targeting the 'credits' parameter. Conduct thorough input validation and sanitization on the server side if custom modifications are possible. Monitor logs for suspicious activity related to this endpoint and parameter. Additionally, organizations should plan to upgrade or replace the vulnerable software with a patched or alternative solution as soon as a vendor fix is released. Regular backups of the database should be maintained to enable recovery in case of data tampering or loss. Finally, raise awareness among IT and security teams about this vulnerability and the importance of rapid incident response.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-17T11:58:37.871Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68cb466bd31237010cfa605b

Added to database: 9/17/2025, 11:38:19 PM

Last enriched: 9/17/2025, 11:38:44 PM

Last updated: 9/19/2025, 3:30:00 PM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats