Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13276: SQL Injection in g33kyrash Online-Banking-System

0
Medium
VulnerabilityCVE-2025-13276cvecve-2025-13276
Published: Mon Nov 17 2025 (11/17/2025, 11:02:06 UTC)
Source: CVE Database V5
Vendor/Project: g33kyrash
Product: Online-Banking-System

Description

A vulnerability was detected in g33kyrash Online-Banking-System up to 12dbfa690e5af649fb72d2e5d3674e88d6743455. This vulnerability affects unknown code of the file /index.php. The manipulation of the argument Username results in sql injection. It is possible to launch the attack remotely. The exploit is now public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available.

AI-Powered Analysis

AILast updated: 11/24/2025, 12:14:32 UTC

Technical Analysis

CVE-2025-13276 is a SQL injection vulnerability identified in the g33kyrash Online-Banking-System, specifically within the /index.php file where the Username parameter is improperly sanitized. This allows an unauthenticated remote attacker to inject malicious SQL code, potentially manipulating the backend database. The vulnerability is present in the rolling release version identified by the commit hash 12dbfa690e5af649fb72d2e5d3674e88d6743455, with no fixed version publicly disclosed yet. The attack vector requires no user interaction or privileges, making it highly accessible to attackers. The CVSS 4.0 vector string (AV:N/AC:L/AT:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P) indicates network attack vector, low attack complexity, no authentication or user interaction, and partial impacts on confidentiality, integrity, and availability. The vulnerability could allow attackers to extract sensitive banking data, modify records, or disrupt services. Although no exploits are currently reported in the wild, the availability of a public exploit increases the urgency for mitigation. The rolling release nature of the software complicates patch management, requiring continuous vigilance. This vulnerability poses a significant risk to financial institutions relying on this system, especially in Europe where online banking is prevalent and data protection regulations are stringent.

Potential Impact

For European organizations, particularly banks and financial service providers using the g33kyrash Online-Banking-System, this vulnerability could lead to unauthorized disclosure of sensitive customer data, including personal and financial information, violating GDPR requirements. Integrity of transaction records could be compromised, enabling fraudulent activities or financial manipulation. Availability impacts, while partial, could disrupt online banking services, damaging customer trust and causing financial losses. The remote, unauthenticated nature of the exploit increases the likelihood of attacks, potentially targeting high-value European financial institutions. The public availability of an exploit further elevates the risk of widespread exploitation. Given Europe's strong regulatory environment and the critical nature of banking infrastructure, exploitation could result in severe legal, financial, and reputational consequences. Organizations may also face increased scrutiny from regulators and customers if breaches occur due to this vulnerability.

Mitigation Recommendations

European organizations should immediately implement rigorous input validation and sanitization on all user-supplied data, especially the Username parameter in the affected system. Employ parameterized queries or prepared statements to prevent SQL injection attacks. Conduct thorough code reviews focusing on database interaction points within the /index.php file and related components. Monitor network traffic and application logs for unusual SQL queries or access patterns indicative of exploitation attempts. Deploy web application firewalls (WAFs) with rules specifically designed to detect and block SQL injection payloads targeting this vulnerability. Engage with the vendor or development team to obtain patches or updates as soon as they become available, and apply them promptly. Given the rolling release model, establish continuous integration and deployment pipelines that include automated security testing for SQL injection vulnerabilities. Train development and security teams on secure coding practices and incident response procedures tailored to banking applications. Finally, prepare incident response plans to quickly contain and remediate any exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-16T20:24:04.933Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691b0db867e4f3aad6206f51

Added to database: 11/17/2025, 11:57:44 AM

Last enriched: 11/24/2025, 12:14:32 PM

Last updated: 1/7/2026, 4:21:40 AM

Views: 76

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats