CVE-2025-10973: SQL Injection in JackieDYH Resume-management-system
A flaw has been found in JackieDYH Resume-management-system up to fb6b857d852dd796e748ce30c606fe5e61c18273. Affected by this issue is some unknown functionality of the file /admin/show.php. This manipulation of the argument userid causes sql injection. The attack may be initiated remotely. The exploit has been published and may be used. This product uses a rolling release model to deliver continuous updates. As a result, specific version information for affected or updated releases is not available. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-10973 is a SQL Injection vulnerability identified in the JackieDYH Resume-management-system, specifically affecting the /admin/show.php file. The vulnerability arises from improper sanitization or validation of the 'userid' parameter, which can be manipulated remotely by an unauthenticated attacker to inject malicious SQL queries. This flaw allows attackers to interfere with the backend database queries, potentially leading to unauthorized data access, data modification, or even complete compromise of the database. The product follows a rolling release model, which complicates pinpointing exact affected versions beyond the commit hash fb6b857d852dd796e748ce30c606fe5e61c18273. The vendor has not responded to disclosure attempts, and no patches or fixes have been published yet. Although no known exploits are currently active in the wild, the exploit code has been published, increasing the risk of exploitation. The CVSS 4.0 score is 6.9 (medium severity), reflecting the network attack vector, no required privileges or user interaction, and partial impact on confidentiality, integrity, and availability. The vulnerability does not affect system components beyond the database interaction layer but can lead to significant data breaches or service disruptions if exploited.
Potential Impact
For European organizations using the JackieDYH Resume-management-system, this vulnerability poses a significant risk to the confidentiality and integrity of sensitive personal and professional data stored within the system. Exploitation could lead to unauthorized disclosure of resumes, personal identifiers, and other HR-related information, potentially violating GDPR and other data protection regulations. The integrity of stored data could also be compromised, affecting recruitment decisions and organizational trust. Availability impact is limited but possible if attackers execute destructive SQL commands. Given the lack of vendor response and patches, organizations face prolonged exposure. The risk is heightened for companies relying heavily on this system for talent acquisition and management, especially those with large volumes of personal data. Additionally, the public availability of exploit code increases the likelihood of opportunistic attacks, including by cybercriminals targeting European entities for identity theft or corporate espionage.
Mitigation Recommendations
Organizations should immediately audit their use of the JackieDYH Resume-management-system and identify any instances of the affected software. In the absence of official patches, implement web application firewall (WAF) rules specifically designed to detect and block SQL injection attempts targeting the 'userid' parameter in /admin/show.php. Employ input validation and parameterized queries or prepared statements if custom modifications are possible. Restrict access to the /admin directory via IP whitelisting or VPN-only access to reduce exposure. Monitor logs for unusual database query patterns or failed login attempts. Consider isolating the resume management system in a segmented network zone to limit lateral movement. Engage in proactive threat hunting for signs of exploitation. Finally, maintain regular backups of the database to enable recovery in case of data corruption or deletion.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy
CVE-2025-10973: SQL Injection in JackieDYH Resume-management-system
Description
A flaw has been found in JackieDYH Resume-management-system up to fb6b857d852dd796e748ce30c606fe5e61c18273. Affected by this issue is some unknown functionality of the file /admin/show.php. This manipulation of the argument userid causes sql injection. The attack may be initiated remotely. The exploit has been published and may be used. This product uses a rolling release model to deliver continuous updates. As a result, specific version information for affected or updated releases is not available. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-10973 is a SQL Injection vulnerability identified in the JackieDYH Resume-management-system, specifically affecting the /admin/show.php file. The vulnerability arises from improper sanitization or validation of the 'userid' parameter, which can be manipulated remotely by an unauthenticated attacker to inject malicious SQL queries. This flaw allows attackers to interfere with the backend database queries, potentially leading to unauthorized data access, data modification, or even complete compromise of the database. The product follows a rolling release model, which complicates pinpointing exact affected versions beyond the commit hash fb6b857d852dd796e748ce30c606fe5e61c18273. The vendor has not responded to disclosure attempts, and no patches or fixes have been published yet. Although no known exploits are currently active in the wild, the exploit code has been published, increasing the risk of exploitation. The CVSS 4.0 score is 6.9 (medium severity), reflecting the network attack vector, no required privileges or user interaction, and partial impact on confidentiality, integrity, and availability. The vulnerability does not affect system components beyond the database interaction layer but can lead to significant data breaches or service disruptions if exploited.
Potential Impact
For European organizations using the JackieDYH Resume-management-system, this vulnerability poses a significant risk to the confidentiality and integrity of sensitive personal and professional data stored within the system. Exploitation could lead to unauthorized disclosure of resumes, personal identifiers, and other HR-related information, potentially violating GDPR and other data protection regulations. The integrity of stored data could also be compromised, affecting recruitment decisions and organizational trust. Availability impact is limited but possible if attackers execute destructive SQL commands. Given the lack of vendor response and patches, organizations face prolonged exposure. The risk is heightened for companies relying heavily on this system for talent acquisition and management, especially those with large volumes of personal data. Additionally, the public availability of exploit code increases the likelihood of opportunistic attacks, including by cybercriminals targeting European entities for identity theft or corporate espionage.
Mitigation Recommendations
Organizations should immediately audit their use of the JackieDYH Resume-management-system and identify any instances of the affected software. In the absence of official patches, implement web application firewall (WAF) rules specifically designed to detect and block SQL injection attempts targeting the 'userid' parameter in /admin/show.php. Employ input validation and parameterized queries or prepared statements if custom modifications are possible. Restrict access to the /admin directory via IP whitelisting or VPN-only access to reduce exposure. Monitor logs for unusual database query patterns or failed login attempts. Consider isolating the resume management system in a segmented network zone to limit lateral movement. Engage in proactive threat hunting for signs of exploitation. Finally, maintain regular backups of the database to enable recovery in case of data corruption or deletion.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-25T14:07:53.339Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68d5ae6ff728b01cbf7e14df
Added to database: 9/25/2025, 9:04:47 PM
Last enriched: 10/3/2025, 12:41:18 AM
Last updated: 11/8/2025, 5:16:20 AM
Views: 43
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-7663: CWE-862 Missing Authorization in ovatheme Ovatheme Events Manager
MediumCVE-2025-12353: CWE-639 Authorization Bypass Through User-Controlled Key in getwpfunnels Easy WordPress Funnel Builder To Collect Leads And Increase Sales – WPFunnels
MediumCVE-2025-12193: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in kitae-park Mang Board WP
MediumCVE-2025-12177: CWE-321 Use of Hard-coded Cryptographic Key in codename065 Download Manager
MediumCVE-2025-12167: CWE-862 Missing Authorization in rnzo Contact Form 7 AWeber Extension
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.