Skip to main content

CVE-2025-11057: SQL Injection in SourceCodester Pet Grooming Management Software

Medium
VulnerabilityCVE-2025-11057cvecve-2025-11057
Published: Sat Sep 27 2025 (09/27/2025, 12:02:05 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: Pet Grooming Management Software

Description

A vulnerability has been found in SourceCodester Pet Grooming Management Software 1.0. Affected by this issue is some unknown functionality of the file /admin/print_inv.php. Such manipulation of the argument ID leads to sql injection. The attack can be executed remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 09/27/2025, 12:11:58 UTC

Technical Analysis

CVE-2025-11057 is a SQL Injection vulnerability identified in SourceCodester Pet Grooming Management Software version 1.0. The vulnerability exists in the /admin/print_inv.php file, specifically through manipulation of the 'ID' parameter. An attacker can remotely exploit this flaw without requiring authentication or user interaction, by injecting malicious SQL code into the 'ID' argument. This can lead to unauthorized access to the backend database, allowing attackers to read, modify, or delete sensitive data, potentially compromising confidentiality, integrity, and availability of the system. The vulnerability has a CVSS 4.0 base score of 6.9, indicating a medium severity level. The attack vector is network-based with low attack complexity and no privileges or user interaction required. The impact on confidentiality, integrity, and availability is low to medium, suggesting limited but meaningful damage potential. Although no known exploits are currently observed in the wild, the public disclosure of the exploit code increases the risk of exploitation. The vulnerability affects only version 1.0 of the software, which is a niche management tool for pet grooming businesses. The lack of available patches or vendor advisories at this time increases the urgency for affected organizations to implement mitigations.

Potential Impact

For European organizations using SourceCodester Pet Grooming Management Software 1.0, this vulnerability poses a risk of data breach and operational disruption. Pet grooming businesses often store customer information, appointment details, and payment records, which could be exposed or altered by an attacker exploiting this SQL injection flaw. This could lead to privacy violations under GDPR, reputational damage, and potential financial losses. Additionally, attackers could manipulate invoice data or disrupt service availability, impacting business continuity. While the software is specialized and likely used by small to medium enterprises, the impact on those affected could be significant due to the sensitivity of customer data and the operational reliance on the software. The remote, unauthenticated nature of the exploit increases the threat level, especially if the software is exposed to the internet without adequate network protections.

Mitigation Recommendations

Since no official patches are currently available, European organizations should immediately implement compensating controls. These include restricting network access to the /admin/print_inv.php endpoint via firewall rules or VPN-only access to limit exposure. Input validation and sanitization should be applied at the web application firewall (WAF) level to detect and block SQL injection attempts targeting the 'ID' parameter. Organizations should audit their logs for suspicious activity related to this endpoint and monitor for unusual database queries. If possible, upgrade or migrate to a newer, patched version of the software once available. Additionally, conducting a thorough security review of the application code and database permissions can reduce the risk of exploitation. Regular backups of critical data should be maintained to enable recovery in case of data tampering or loss.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-26T09:52:31.653Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68d7d47bbffa51b9449a73f2

Added to database: 9/27/2025, 12:11:39 PM

Last enriched: 9/27/2025, 12:11:58 PM

Last updated: 9/29/2025, 12:31:26 AM

Views: 20

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats