CVE-2025-10626: SQL Injection in SourceCodester Online Exam Form Submission
A flaw has been found in SourceCodester Online Exam Form Submission 1.0. Affected by this issue is some unknown functionality of the file /admin/update_s3.php. This manipulation of the argument credits causes sql injection. Remote exploitation of the attack is possible. The exploit has been published and may be used.
AI Analysis
Technical Summary
CVE-2025-10626 is a medium-severity SQL Injection vulnerability identified in SourceCodester Online Exam Form Submission version 1.0. The vulnerability exists in the /admin/update_s3.php script, specifically through the manipulation of the 'credits' parameter. This flaw allows an unauthenticated remote attacker to inject malicious SQL code due to insufficient input validation or sanitization of this parameter. The vulnerability does not require user interaction or authentication, and the attack vector is network-based, making it accessible remotely. Exploiting this vulnerability could enable an attacker to execute arbitrary SQL commands on the backend database, potentially leading to unauthorized data disclosure, data modification, or even deletion. The CVSS 4.0 vector indicates low complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and partial impacts on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although no public exploit is currently known to be in the wild, the exploit code has been published, increasing the risk of exploitation. The vulnerability affects only version 1.0 of the product, which is a niche online exam management system, typically used by educational institutions or training organizations to manage exam form submissions. The lack of available patches or mitigations from the vendor at the time of publication increases the urgency for affected organizations to implement compensating controls.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for educational institutions, certification bodies, and training providers that rely on SourceCodester Online Exam Form Submission 1.0. Successful exploitation could lead to unauthorized access to sensitive student or candidate data, including personal information and exam results, violating data protection regulations such as GDPR. Data integrity could be compromised, potentially allowing attackers to alter exam submissions or results, undermining the credibility of certification processes. Availability could also be affected if attackers execute destructive SQL commands, causing service disruptions. Given the remote exploitability without authentication, attackers could target multiple institutions en masse, leading to widespread data breaches or operational disruptions. The medium CVSS score reflects moderate risk, but the presence of published exploit code elevates the threat level. Organizations in Europe must consider the reputational damage, regulatory fines, and operational impact that could arise from exploitation of this vulnerability.
Mitigation Recommendations
Since no official patch is currently available, European organizations should implement immediate compensating controls. First, restrict access to the /admin/update_s3.php endpoint by IP whitelisting or VPN access to limit exposure to trusted administrators only. Implement web application firewall (WAF) rules to detect and block SQL injection patterns targeting the 'credits' parameter. Conduct thorough input validation and sanitization on the server side if custom modifications are possible. Monitor logs for suspicious activity related to this endpoint and parameter. Additionally, organizations should plan to upgrade or replace the vulnerable software with a patched or alternative solution as soon as a vendor fix is released. Regular backups of the database should be maintained to enable recovery in case of data tampering or loss. Finally, raise awareness among IT and security teams about this vulnerability and the importance of rapid incident response.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-10626: SQL Injection in SourceCodester Online Exam Form Submission
Description
A flaw has been found in SourceCodester Online Exam Form Submission 1.0. Affected by this issue is some unknown functionality of the file /admin/update_s3.php. This manipulation of the argument credits causes sql injection. Remote exploitation of the attack is possible. The exploit has been published and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-10626 is a medium-severity SQL Injection vulnerability identified in SourceCodester Online Exam Form Submission version 1.0. The vulnerability exists in the /admin/update_s3.php script, specifically through the manipulation of the 'credits' parameter. This flaw allows an unauthenticated remote attacker to inject malicious SQL code due to insufficient input validation or sanitization of this parameter. The vulnerability does not require user interaction or authentication, and the attack vector is network-based, making it accessible remotely. Exploiting this vulnerability could enable an attacker to execute arbitrary SQL commands on the backend database, potentially leading to unauthorized data disclosure, data modification, or even deletion. The CVSS 4.0 vector indicates low complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and partial impacts on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although no public exploit is currently known to be in the wild, the exploit code has been published, increasing the risk of exploitation. The vulnerability affects only version 1.0 of the product, which is a niche online exam management system, typically used by educational institutions or training organizations to manage exam form submissions. The lack of available patches or mitigations from the vendor at the time of publication increases the urgency for affected organizations to implement compensating controls.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for educational institutions, certification bodies, and training providers that rely on SourceCodester Online Exam Form Submission 1.0. Successful exploitation could lead to unauthorized access to sensitive student or candidate data, including personal information and exam results, violating data protection regulations such as GDPR. Data integrity could be compromised, potentially allowing attackers to alter exam submissions or results, undermining the credibility of certification processes. Availability could also be affected if attackers execute destructive SQL commands, causing service disruptions. Given the remote exploitability without authentication, attackers could target multiple institutions en masse, leading to widespread data breaches or operational disruptions. The medium CVSS score reflects moderate risk, but the presence of published exploit code elevates the threat level. Organizations in Europe must consider the reputational damage, regulatory fines, and operational impact that could arise from exploitation of this vulnerability.
Mitigation Recommendations
Since no official patch is currently available, European organizations should implement immediate compensating controls. First, restrict access to the /admin/update_s3.php endpoint by IP whitelisting or VPN access to limit exposure to trusted administrators only. Implement web application firewall (WAF) rules to detect and block SQL injection patterns targeting the 'credits' parameter. Conduct thorough input validation and sanitization on the server side if custom modifications are possible. Monitor logs for suspicious activity related to this endpoint and parameter. Additionally, organizations should plan to upgrade or replace the vulnerable software with a patched or alternative solution as soon as a vendor fix is released. Regular backups of the database should be maintained to enable recovery in case of data tampering or loss. Finally, raise awareness among IT and security teams about this vulnerability and the importance of rapid incident response.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-17T11:58:37.871Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68cb466bd31237010cfa605b
Added to database: 9/17/2025, 11:38:19 PM
Last enriched: 9/17/2025, 11:38:44 PM
Last updated: 9/19/2025, 3:30:00 PM
Views: 9
Related Threats
CVE-2025-36248: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in IBM Copy Services Manager
MediumCVE-2025-57296: n/a
CriticalCVE-2025-56869: n/a
HighCVE-2025-10718: Improper Export of Android Application Components in Ooma Office Business Phone App
MediumCVE-2025-55910: n/a
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.