Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13059: SQL Injection in SourceCodester Alumni Management System

0
Medium
VulnerabilityCVE-2025-13059cvecve-2025-13059
Published: Wed Nov 12 2025 (11/12/2025, 20:02:06 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: Alumni Management System

Description

A weakness has been identified in SourceCodester Alumni Management System 1.0. The impacted element is an unknown function of the file /manage_career.php. This manipulation of the argument ID causes sql injection. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be exploited.

AI-Powered Analysis

AILast updated: 11/12/2025, 20:25:39 UTC

Technical Analysis

CVE-2025-13059 identifies a SQL injection vulnerability in SourceCodester Alumni Management System version 1.0, specifically within the /manage_career.php script. The vulnerability is triggered by manipulation of the 'ID' parameter, which is not properly sanitized before being incorporated into SQL queries. This flaw allows remote attackers to inject arbitrary SQL code, potentially enabling unauthorized access to or modification of the backend database. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), and does not require authentication (PR:L) or user interaction (UI:N). The vulnerability impacts the confidentiality, integrity, and availability of the system, though with limited scope (VC:L, VI:L, VA:L). The CVSS 4.0 score of 5.3 reflects a medium severity level, indicating a moderate risk. The exploit has been publicly disclosed, increasing the risk of exploitation, although no active widespread attacks have been documented. The vulnerability primarily affects organizations using this specific version of the SourceCodester Alumni Management System, which is typically deployed in educational institutions to manage alumni data. The lack of patches or vendor-provided fixes at the time of disclosure necessitates immediate mitigation efforts by users. The vulnerability underscores the importance of secure coding practices, such as input validation and use of parameterized queries, to prevent injection flaws.

Potential Impact

For European organizations, particularly universities, colleges, and alumni associations using SourceCodester Alumni Management System 1.0, this vulnerability poses a significant risk. Exploitation could lead to unauthorized disclosure of sensitive alumni data, including personal information and career details, potentially violating GDPR and other privacy regulations. Data integrity could be compromised, allowing attackers to alter records, which may affect institutional reputation and trust. Availability impacts could arise if attackers execute destructive SQL commands, causing service disruptions. The public availability of exploit code increases the likelihood of opportunistic attacks, especially against less-secure or unpatched systems. Given the medium severity, the threat is moderate but should not be underestimated, as educational institutions often hold valuable personal data and are increasingly targeted by cybercriminals. The risk is exacerbated by the lack of vendor patches, requiring organizations to implement compensating controls promptly.

Mitigation Recommendations

1. Immediately audit all instances of SourceCodester Alumni Management System 1.0 to identify vulnerable deployments. 2. Implement input validation and sanitization on the 'ID' parameter in /manage_career.php, ensuring only expected data types and formats are accepted. 3. Refactor database queries to use parameterized statements or prepared queries to eliminate SQL injection risks. 4. Restrict database user privileges to the minimum necessary, preventing unauthorized data manipulation or access. 5. Monitor logs for suspicious activity related to the 'ID' parameter or unusual database queries. 6. If vendor patches become available, apply them promptly. 7. Consider deploying Web Application Firewalls (WAFs) with rules to detect and block SQL injection attempts targeting this endpoint. 8. Educate development and IT teams on secure coding practices to prevent similar vulnerabilities. 9. Regularly back up data and test restoration procedures to mitigate potential data loss from exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-12T12:42:05.297Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6914eb7ff3584f3d8b259f6a

Added to database: 11/12/2025, 8:18:07 PM

Last enriched: 11/12/2025, 8:25:39 PM

Last updated: 11/12/2025, 10:39:09 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats