Skip to main content

CVE-2025-10836: SQL Injection in SourceCodester Pet Grooming Management Software

Medium
VulnerabilityCVE-2025-10836cvecve-2025-10836
Published: Tue Sep 23 2025 (09/23/2025, 03:32:10 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: Pet Grooming Management Software

Description

A weakness has been identified in SourceCodester Pet Grooming Management Software 1.0. Affected is an unknown function of the file /admin/print1.php. Executing manipulation of the argument ID can lead to sql injection. The attack can be launched remotely. The exploit has been made available to the public and could be exploited.

AI-Powered Analysis

AILast updated: 09/23/2025, 04:01:17 UTC

Technical Analysis

CVE-2025-10836 is a SQL Injection vulnerability identified in SourceCodester Pet Grooming Management Software version 1.0. The vulnerability exists in an unspecified function within the /admin/print1.php file, where manipulation of the 'ID' parameter allows an attacker to inject malicious SQL code. This injection flaw can be exploited remotely without requiring authentication or user interaction, making it a significant risk. The vulnerability allows attackers to interfere with the application's database queries, potentially leading to unauthorized data access, data modification, or deletion. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the ease of exploitation (network vector, no privileges or user interaction required) and the limited confidentiality, integrity, and availability impact (low to medium). The vulnerability has been publicly disclosed, and exploit code is available, increasing the risk of exploitation. However, there are no known exploits actively used in the wild at this time, and no official patches have been released by the vendor. The lack of patches and public exploit availability necessitate immediate attention from organizations using this software.

Potential Impact

For European organizations using SourceCodester Pet Grooming Management Software 1.0, this vulnerability poses a risk of unauthorized access to sensitive customer and business data stored in the backend database. Attackers exploiting this flaw could extract personal information, manipulate grooming records, or disrupt business operations by altering or deleting data. This could lead to reputational damage, regulatory non-compliance (especially under GDPR due to potential personal data exposure), and financial losses. Since the software is niche, the direct impact may be limited to small and medium enterprises in the pet care sector. However, any breach involving personal data in Europe can trigger significant legal and financial consequences. The remote and unauthenticated nature of the attack vector increases the likelihood of exploitation if the software is internet-facing or accessible from untrusted networks.

Mitigation Recommendations

Organizations should immediately audit their use of SourceCodester Pet Grooming Management Software to determine if version 1.0 is deployed. If so, they should restrict access to the /admin/print1.php endpoint by implementing network-level controls such as IP whitelisting or VPN access to administrative interfaces. Input validation and parameterized queries should be implemented to prevent SQL injection; if the vendor has not released a patch, organizations may need to apply custom code fixes or engage security professionals to remediate the vulnerable code. Monitoring and logging database queries for suspicious activity can help detect exploitation attempts. Additionally, organizations should isolate the application from the public internet where possible and ensure regular backups are in place to recover from potential data tampering. Finally, organizations should stay alert for vendor updates or patches addressing this vulnerability and apply them promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-21T19:38:42.105Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68d218bcefb46fd0305fd7df

Added to database: 9/23/2025, 3:49:16 AM

Last enriched: 9/23/2025, 4:01:17 AM

Last updated: 9/24/2025, 5:41:50 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats