CVE-2025-10839: SQL Injection in SourceCodester Pet Grooming Management Software
A security flaw has been discovered in SourceCodester Pet Grooming Management Software 1.0. The impacted element is an unknown function of the file /admin/inv-print.php. The manipulation of the argument ID results in sql injection. It is possible to launch the attack remotely. The exploit has been released to the public and may be exploited.
AI Analysis
Technical Summary
CVE-2025-10839 is a medium-severity SQL Injection vulnerability identified in SourceCodester Pet Grooming Management Software version 1.0. The vulnerability exists in an unspecified function within the /admin/inv-print.php file, where the 'ID' parameter is improperly sanitized, allowing an attacker to inject malicious SQL code. This flaw enables remote exploitation without requiring user interaction or authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The vulnerability impacts the confidentiality, integrity, and availability of the underlying database, albeit with limited scope and impact (VC:L, VI:L, VA:L). The CVSS score of 5.3 reflects a moderate risk, with the potential for attackers to extract sensitive data, modify records, or disrupt database operations. No official patches or fixes have been published yet, and while no known exploits are currently observed in the wild, the public availability of exploit code increases the risk of imminent attacks. The vulnerability affects only version 1.0 of the software, which is a niche application used primarily by pet grooming businesses to manage appointments, inventory, and client data. The SQL Injection vector in an administrative module suggests that attackers might gain access to sensitive business and customer information if the system is exposed to the internet or poorly segmented within internal networks.
Potential Impact
For European organizations using SourceCodester Pet Grooming Management Software 1.0, this vulnerability poses a tangible risk to business continuity and data privacy. Exploitation could lead to unauthorized disclosure of client personal data, including contact details and pet information, potentially violating GDPR requirements. Integrity of inventory and transaction records could be compromised, leading to financial discrepancies or operational disruptions. Availability impacts could manifest as denial of service or corrupted database states, affecting service delivery. Given the software's specialized use, the overall impact is limited to businesses in the pet grooming sector but could be significant for those relying heavily on this software for daily operations. Additionally, compromised systems could be leveraged as pivot points for broader network attacks, especially in small to medium enterprises with limited cybersecurity defenses.
Mitigation Recommendations
Organizations should immediately audit their use of SourceCodester Pet Grooming Management Software to identify affected instances. Since no official patches are currently available, mitigation should focus on restricting access to the /admin/inv-print.php endpoint via network segmentation and firewall rules, limiting it to trusted internal IP addresses only. Implementing Web Application Firewalls (WAFs) with SQL Injection detection and prevention capabilities can help block exploit attempts. Administrators should review and sanitize all inputs, especially the 'ID' parameter, applying parameterized queries or prepared statements if source code access is possible. Monitoring logs for suspicious SQL queries or unusual access patterns is critical. Organizations should also consider isolating the application in a hardened environment and preparing for an upgrade or migration to a patched or alternative solution once available. Regular backups of the database should be maintained to enable recovery in case of data corruption or loss.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden
CVE-2025-10839: SQL Injection in SourceCodester Pet Grooming Management Software
Description
A security flaw has been discovered in SourceCodester Pet Grooming Management Software 1.0. The impacted element is an unknown function of the file /admin/inv-print.php. The manipulation of the argument ID results in sql injection. It is possible to launch the attack remotely. The exploit has been released to the public and may be exploited.
AI-Powered Analysis
Technical Analysis
CVE-2025-10839 is a medium-severity SQL Injection vulnerability identified in SourceCodester Pet Grooming Management Software version 1.0. The vulnerability exists in an unspecified function within the /admin/inv-print.php file, where the 'ID' parameter is improperly sanitized, allowing an attacker to inject malicious SQL code. This flaw enables remote exploitation without requiring user interaction or authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The vulnerability impacts the confidentiality, integrity, and availability of the underlying database, albeit with limited scope and impact (VC:L, VI:L, VA:L). The CVSS score of 5.3 reflects a moderate risk, with the potential for attackers to extract sensitive data, modify records, or disrupt database operations. No official patches or fixes have been published yet, and while no known exploits are currently observed in the wild, the public availability of exploit code increases the risk of imminent attacks. The vulnerability affects only version 1.0 of the software, which is a niche application used primarily by pet grooming businesses to manage appointments, inventory, and client data. The SQL Injection vector in an administrative module suggests that attackers might gain access to sensitive business and customer information if the system is exposed to the internet or poorly segmented within internal networks.
Potential Impact
For European organizations using SourceCodester Pet Grooming Management Software 1.0, this vulnerability poses a tangible risk to business continuity and data privacy. Exploitation could lead to unauthorized disclosure of client personal data, including contact details and pet information, potentially violating GDPR requirements. Integrity of inventory and transaction records could be compromised, leading to financial discrepancies or operational disruptions. Availability impacts could manifest as denial of service or corrupted database states, affecting service delivery. Given the software's specialized use, the overall impact is limited to businesses in the pet grooming sector but could be significant for those relying heavily on this software for daily operations. Additionally, compromised systems could be leveraged as pivot points for broader network attacks, especially in small to medium enterprises with limited cybersecurity defenses.
Mitigation Recommendations
Organizations should immediately audit their use of SourceCodester Pet Grooming Management Software to identify affected instances. Since no official patches are currently available, mitigation should focus on restricting access to the /admin/inv-print.php endpoint via network segmentation and firewall rules, limiting it to trusted internal IP addresses only. Implementing Web Application Firewalls (WAFs) with SQL Injection detection and prevention capabilities can help block exploit attempts. Administrators should review and sanitize all inputs, especially the 'ID' parameter, applying parameterized queries or prepared statements if source code access is possible. Monitoring logs for suspicious SQL queries or unusual access patterns is critical. Organizations should also consider isolating the application in a hardened environment and preparing for an upgrade or migration to a patched or alternative solution once available. Regular backups of the database should be maintained to enable recovery in case of data corruption or loss.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-22T05:17:19.301Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68d2f210c36d6fa294642ad7
Added to database: 9/23/2025, 7:16:32 PM
Last enriched: 9/23/2025, 7:20:13 PM
Last updated: 10/7/2025, 7:45:01 AM
Views: 38
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11357: SQL Injection in code-projects Simple Banking System
MediumCVE-2025-7400: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in marceljm Featured Image from URL (FIFU)
MediumCVE-2025-11355: Buffer Overflow in UTT 1250GW
HighCVE-2025-11356: Buffer Overflow in Tenda AC23
HighCVE-2025-11354: Unrestricted Upload in code-projects Online Hotel Reservation System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.