Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13276: SQL Injection in g33kyrash Online-Banking-System

0
Medium
VulnerabilityCVE-2025-13276cvecve-2025-13276
Published: Mon Nov 17 2025 (11/17/2025, 11:02:06 UTC)
Source: CVE Database V5
Vendor/Project: g33kyrash
Product: Online-Banking-System

Description

A vulnerability was detected in g33kyrash Online-Banking-System up to 12dbfa690e5af649fb72d2e5d3674e88d6743455. This vulnerability affects unknown code of the file /index.php. The manipulation of the argument Username results in sql injection. It is possible to launch the attack remotely. The exploit is now public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available.

AI-Powered Analysis

AILast updated: 11/17/2025, 11:58:41 UTC

Technical Analysis

CVE-2025-13276 identifies a SQL Injection vulnerability in the g33kyrash Online-Banking-System, specifically within the /index.php file where the Username parameter is improperly sanitized. This allows remote attackers to inject arbitrary SQL commands without authentication or user interaction, exploiting the system over the network. The vulnerability affects versions up to the commit 12dbfa690e5af649fb72d2e5d3674e88d6743455, but due to the product's rolling release model, exact versioning is unclear, complicating patch identification. The CVSS 4.0 score of 6.9 reflects a medium severity, considering the attack vector is network-based with low complexity and no privileges or user interaction required, but with limited scope and impact on confidentiality, integrity, and availability. The exploit is publicly available, increasing the risk of exploitation, although no active exploitation has been reported yet. The vulnerability could allow attackers to extract sensitive banking data, modify or delete records, or disrupt service availability, posing significant risks to financial institutions. The lack of official patches or updates at the time of publication necessitates immediate mitigation efforts by organizations using this system.

Potential Impact

For European organizations, particularly banks and financial institutions using the g33kyrash Online-Banking-System, this vulnerability could lead to unauthorized disclosure of sensitive customer data, financial fraud, and disruption of online banking services. The compromise of banking data could result in regulatory penalties under GDPR due to data breaches, loss of customer trust, and financial losses. The ability to remotely exploit the vulnerability without authentication increases the attack surface, making it easier for cybercriminals to target multiple institutions. Additionally, the public availability of exploits raises the likelihood of opportunistic attacks. The rolling release nature of the software complicates patch management, potentially delaying remediation and increasing exposure time. European financial sectors are heavily regulated and targeted by threat actors, so this vulnerability represents a significant risk to operational continuity and data security.

Mitigation Recommendations

Organizations should immediately implement strict input validation and sanitization on the Username parameter to prevent SQL injection. Employ parameterized queries or prepared statements in the database access code to eliminate direct injection risks. Conduct thorough code reviews focusing on input handling in /index.php and related modules. Deploy web application firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the Username parameter. Monitor logs for unusual database queries or failed login attempts indicative of exploitation attempts. Engage with the vendor or development team to obtain patches or updates addressing this vulnerability, and apply them promptly once available. Consider isolating or restricting access to the affected system components until remediation is complete. Educate security teams on this specific threat to enhance detection and response capabilities. Finally, perform penetration testing and vulnerability scanning regularly to identify and remediate similar injection flaws proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-16T20:24:04.933Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691b0db867e4f3aad6206f51

Added to database: 11/17/2025, 11:57:44 AM

Last enriched: 11/17/2025, 11:58:41 AM

Last updated: 11/17/2025, 2:19:31 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats