CVE-2025-10973: SQL Injection in JackieDYH Resume-management-system
A flaw has been found in JackieDYH Resume-management-system up to fb6b857d852dd796e748ce30c606fe5e61c18273. Affected by this issue is some unknown functionality of the file /admin/show.php. This manipulation of the argument userid causes sql injection. The attack may be initiated remotely. The exploit has been published and may be used. This product uses a rolling release model to deliver continuous updates. As a result, specific version information for affected or updated releases is not available. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-10973 is a SQL Injection vulnerability identified in the JackieDYH Resume-management-system, specifically affecting the /admin/show.php file. The vulnerability arises from improper sanitization or validation of the 'userid' parameter, allowing an attacker to manipulate SQL queries executed by the backend database. This flaw enables remote attackers to inject arbitrary SQL code without requiring authentication or user interaction, potentially leading to unauthorized data access or modification. The product follows a rolling release model, complicating precise version tracking, but the vulnerability affects versions up to commit fb6b857d852dd796e748ce30c606fe5e61c18273. The vendor has not responded to disclosure attempts, and no official patch has been released. The CVSS v4.0 base score is 6.9 (medium severity), reflecting network attack vector, low complexity, no privileges or user interaction required, and limited impact on confidentiality, integrity, and availability. Although no known exploits are currently in the wild, the public disclosure of the exploit code increases the risk of exploitation.
Potential Impact
For European organizations using the JackieDYH Resume-management-system, this vulnerability poses a significant risk to the confidentiality and integrity of sensitive personnel data. Exploitation could allow attackers to extract, modify, or delete resume and user information stored within the system, potentially leading to data breaches, identity theft, or disruption of HR operations. Given the administrative context of the vulnerable endpoint, attackers might gain elevated access to internal data. The lack of vendor response and patch availability increases exposure time. Organizations in sectors with strict data protection regulations, such as GDPR, face legal and reputational consequences if personal data is compromised. Additionally, the remote and unauthenticated nature of the attack vector means that attackers can exploit this vulnerability from anywhere, increasing the threat surface for European entities.
Mitigation Recommendations
European organizations should immediately audit their use of the JackieDYH Resume-management-system to determine exposure. If the system is deployed, restrict access to the /admin/show.php endpoint through network segmentation, firewall rules, or VPN access to trusted administrators only. Implement Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'userid' parameter. Conduct thorough input validation and sanitization on all user-supplied data, especially parameters used in SQL queries. Where possible, migrate to parameterized queries or prepared statements to eliminate injection risks. Monitor logs for suspicious query patterns or repeated access attempts to the vulnerable endpoint. Given the absence of an official patch, consider isolating or temporarily disabling the vulnerable functionality until a fix is available or switching to alternative resume management solutions with better security track records. Engage with the vendor or community to track any forthcoming patches or mitigations.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium, Sweden
CVE-2025-10973: SQL Injection in JackieDYH Resume-management-system
Description
A flaw has been found in JackieDYH Resume-management-system up to fb6b857d852dd796e748ce30c606fe5e61c18273. Affected by this issue is some unknown functionality of the file /admin/show.php. This manipulation of the argument userid causes sql injection. The attack may be initiated remotely. The exploit has been published and may be used. This product uses a rolling release model to deliver continuous updates. As a result, specific version information for affected or updated releases is not available. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-10973 is a SQL Injection vulnerability identified in the JackieDYH Resume-management-system, specifically affecting the /admin/show.php file. The vulnerability arises from improper sanitization or validation of the 'userid' parameter, allowing an attacker to manipulate SQL queries executed by the backend database. This flaw enables remote attackers to inject arbitrary SQL code without requiring authentication or user interaction, potentially leading to unauthorized data access or modification. The product follows a rolling release model, complicating precise version tracking, but the vulnerability affects versions up to commit fb6b857d852dd796e748ce30c606fe5e61c18273. The vendor has not responded to disclosure attempts, and no official patch has been released. The CVSS v4.0 base score is 6.9 (medium severity), reflecting network attack vector, low complexity, no privileges or user interaction required, and limited impact on confidentiality, integrity, and availability. Although no known exploits are currently in the wild, the public disclosure of the exploit code increases the risk of exploitation.
Potential Impact
For European organizations using the JackieDYH Resume-management-system, this vulnerability poses a significant risk to the confidentiality and integrity of sensitive personnel data. Exploitation could allow attackers to extract, modify, or delete resume and user information stored within the system, potentially leading to data breaches, identity theft, or disruption of HR operations. Given the administrative context of the vulnerable endpoint, attackers might gain elevated access to internal data. The lack of vendor response and patch availability increases exposure time. Organizations in sectors with strict data protection regulations, such as GDPR, face legal and reputational consequences if personal data is compromised. Additionally, the remote and unauthenticated nature of the attack vector means that attackers can exploit this vulnerability from anywhere, increasing the threat surface for European entities.
Mitigation Recommendations
European organizations should immediately audit their use of the JackieDYH Resume-management-system to determine exposure. If the system is deployed, restrict access to the /admin/show.php endpoint through network segmentation, firewall rules, or VPN access to trusted administrators only. Implement Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'userid' parameter. Conduct thorough input validation and sanitization on all user-supplied data, especially parameters used in SQL queries. Where possible, migrate to parameterized queries or prepared statements to eliminate injection risks. Monitor logs for suspicious query patterns or repeated access attempts to the vulnerable endpoint. Given the absence of an official patch, consider isolating or temporarily disabling the vulnerable functionality until a fix is available or switching to alternative resume management solutions with better security track records. Engage with the vendor or community to track any forthcoming patches or mitigations.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-25T14:07:53.339Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68d5ae6ff728b01cbf7e14df
Added to database: 9/25/2025, 9:04:47 PM
Last enriched: 9/25/2025, 9:05:00 PM
Last updated: 9/26/2025, 12:10:45 AM
Views: 4
Related Threats
CVE-2025-21056: CWE-20 Improper Input Validation in Samsung Mobile Retail Mode
MediumCVE-2025-59422: CWE-284: Improper Access Control in langgenius dify
MediumCVE-2025-10467: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in PROLIZ Computer Software Hardware Service Trade Ltd. Co. OBS (Student Affairs Information System)
HighCVE-2025-59841: CWE-384: Session Fixation in FlagForgeCTF flagForge
CriticalCVE-2025-55557: n/a
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.