CVE-2025-10673: SQL Injection in itsourcecode Student Information Management System
A vulnerability was determined in itsourcecode Student Information Management System 1.0. The impacted element is an unknown function of the file /admin/modules/class/index.php. This manipulation of the argument classId causes sql injection. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized.
AI Analysis
Technical Summary
CVE-2025-10673 is a SQL Injection vulnerability identified in version 1.0 of the itsourcecode Student Information Management System (SIMS). The vulnerability resides in an unspecified function within the file /admin/modules/class/index.php, where the manipulation of the 'classId' parameter allows an attacker to inject malicious SQL code. This flaw enables remote exploitation without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/AT:N/PR:N/UI:N). The vulnerability impacts the confidentiality, integrity, and availability of the underlying database, as successful exploitation could lead to unauthorized data access, data modification, or deletion. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the ease of exploitation and the potential for partial impact on data confidentiality, integrity, and availability. Although no public exploits are currently known in the wild, the vulnerability has been publicly disclosed, increasing the risk of exploitation by threat actors. The lack of available patches or mitigations from the vendor further elevates the risk for organizations using this software. The Student Information Management System is typically used by educational institutions to manage sensitive student data, including personal information, academic records, and administrative details, making the impact of a breach significant in terms of privacy and regulatory compliance.
Potential Impact
For European organizations, particularly educational institutions using the itsourcecode SIMS version 1.0, this vulnerability poses a significant risk to the confidentiality and integrity of student data. Exploitation could lead to unauthorized disclosure of personal and academic information, violating GDPR and other data protection regulations, potentially resulting in legal penalties and reputational damage. Data integrity could be compromised, affecting academic records and administrative processes. Availability impacts could disrupt school operations if the database is corrupted or deleted. The remote, unauthenticated nature of the exploit increases the attack surface, especially for institutions with internet-facing management interfaces. Given the sensitivity of educational data and the strict regulatory environment in Europe, the vulnerability could have severe operational and compliance consequences.
Mitigation Recommendations
1. Immediate mitigation should include restricting external access to the /admin/modules/class/index.php endpoint by implementing network-level controls such as IP whitelisting or VPN access for administrative interfaces. 2. Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the 'classId' parameter. 3. Conduct a thorough code review and implement parameterized queries or prepared statements to eliminate SQL injection vectors in the affected code. 4. If vendor patches are unavailable, consider isolating the affected system within a segmented network zone with strict access controls. 5. Regularly monitor logs for suspicious database queries or anomalies related to the 'classId' parameter. 6. Educate IT staff on the vulnerability and ensure incident response plans include procedures for SQL injection attacks. 7. Plan for an upgrade or migration to a patched or alternative Student Information Management System that follows secure coding practices.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Poland, Netherlands
CVE-2025-10673: SQL Injection in itsourcecode Student Information Management System
Description
A vulnerability was determined in itsourcecode Student Information Management System 1.0. The impacted element is an unknown function of the file /admin/modules/class/index.php. This manipulation of the argument classId causes sql injection. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized.
AI-Powered Analysis
Technical Analysis
CVE-2025-10673 is a SQL Injection vulnerability identified in version 1.0 of the itsourcecode Student Information Management System (SIMS). The vulnerability resides in an unspecified function within the file /admin/modules/class/index.php, where the manipulation of the 'classId' parameter allows an attacker to inject malicious SQL code. This flaw enables remote exploitation without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/AT:N/PR:N/UI:N). The vulnerability impacts the confidentiality, integrity, and availability of the underlying database, as successful exploitation could lead to unauthorized data access, data modification, or deletion. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the ease of exploitation and the potential for partial impact on data confidentiality, integrity, and availability. Although no public exploits are currently known in the wild, the vulnerability has been publicly disclosed, increasing the risk of exploitation by threat actors. The lack of available patches or mitigations from the vendor further elevates the risk for organizations using this software. The Student Information Management System is typically used by educational institutions to manage sensitive student data, including personal information, academic records, and administrative details, making the impact of a breach significant in terms of privacy and regulatory compliance.
Potential Impact
For European organizations, particularly educational institutions using the itsourcecode SIMS version 1.0, this vulnerability poses a significant risk to the confidentiality and integrity of student data. Exploitation could lead to unauthorized disclosure of personal and academic information, violating GDPR and other data protection regulations, potentially resulting in legal penalties and reputational damage. Data integrity could be compromised, affecting academic records and administrative processes. Availability impacts could disrupt school operations if the database is corrupted or deleted. The remote, unauthenticated nature of the exploit increases the attack surface, especially for institutions with internet-facing management interfaces. Given the sensitivity of educational data and the strict regulatory environment in Europe, the vulnerability could have severe operational and compliance consequences.
Mitigation Recommendations
1. Immediate mitigation should include restricting external access to the /admin/modules/class/index.php endpoint by implementing network-level controls such as IP whitelisting or VPN access for administrative interfaces. 2. Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the 'classId' parameter. 3. Conduct a thorough code review and implement parameterized queries or prepared statements to eliminate SQL injection vectors in the affected code. 4. If vendor patches are unavailable, consider isolating the affected system within a segmented network zone with strict access controls. 5. Regularly monitor logs for suspicious database queries or anomalies related to the 'classId' parameter. 6. Educate IT staff on the vulnerability and ensure incident response plans include procedures for SQL injection attacks. 7. Plan for an upgrade or migration to a patched or alternative Student Information Management System that follows secure coding practices.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-18T05:48:03.208Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68cc212964e6b4fd4107bb33
Added to database: 9/18/2025, 3:11:37 PM
Last enriched: 9/18/2025, 3:11:53 PM
Last updated: 9/18/2025, 7:34:35 PM
Views: 5
Related Threats
CVE-2025-10035: CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection') in Fortra GoAnywhere MFT
CriticalCVE-2025-59220: CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in Microsoft Windows Server 2022
HighCVE-2025-59216: CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in Microsoft Windows Server 2025 (Server Core installation)
HighCVE-2025-59215: CWE-416: Use After Free in Microsoft Windows Server 2025 (Server Core installation)
HighCVE-2025-54754: CWE-259 in Cognex In-Sight 2000 series
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.