CVE-2025-13325: SQL Injection in itsourcecode Student Information System
A vulnerability was determined in itsourcecode Student Information System 1.0. The affected element is an unknown function of the file /enrollment_edit1.php. Executing manipulation of the argument en_id can lead to sql injection. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized.
AI Analysis
Technical Summary
CVE-2025-13325 identifies a SQL Injection vulnerability in the itsourcecode Student Information System version 1.0. The vulnerability resides in the /enrollment_edit1.php script, where the en_id parameter is improperly sanitized, allowing an attacker to inject malicious SQL code. This injection flaw can be exploited remotely without requiring authentication or user interaction, enabling attackers to manipulate backend database queries. Potential consequences include unauthorized retrieval, modification, or deletion of sensitive student records, which compromises data confidentiality and integrity. The vulnerability has a CVSS 4.0 base score of 5.3, reflecting medium severity due to the lack of authentication but limited impact scope and complexity. Although no active exploits are reported, the public disclosure increases the risk of exploitation by threat actors. The vulnerability affects only version 1.0 of the software, and no official patches have been published yet. The attack vector is network-based, and the vulnerability does not require social engineering, making it accessible to remote attackers scanning for vulnerable endpoints. The lack of secure coding practices, such as parameterized queries or prepared statements, is the root cause. This vulnerability is particularly critical for educational institutions relying on this system to manage enrollment and student data, as exploitation could lead to data breaches and regulatory non-compliance.
Potential Impact
For European organizations, particularly educational institutions using the itsourcecode Student Information System 1.0, this vulnerability poses a significant risk to the confidentiality and integrity of student data. Exploitation could lead to unauthorized disclosure of personal information, manipulation of enrollment records, or disruption of student services. Such incidents could result in reputational damage, legal penalties under GDPR, and loss of trust from students and stakeholders. The remote and unauthenticated nature of the attack increases the likelihood of exploitation, especially in environments with exposed web interfaces and insufficient network segmentation. Additionally, the medium severity score suggests that while the impact is serious, it may not lead to full system compromise or widespread service disruption. However, the educational sector's critical role and the sensitivity of the data involved elevate the importance of timely mitigation. Organizations with limited cybersecurity resources or outdated software management practices are particularly vulnerable. The lack of an official patch increases the window of exposure, necessitating immediate compensating controls.
Mitigation Recommendations
1. Implement immediate input validation and sanitization on the en_id parameter to prevent injection of malicious SQL code. 2. Refactor the vulnerable code to use parameterized queries or prepared statements, eliminating direct concatenation of user inputs into SQL commands. 3. Restrict access to the /enrollment_edit1.php endpoint through network segmentation, firewall rules, or VPN access to limit exposure. 4. Monitor database logs and web server access logs for unusual query patterns or repeated failed attempts that may indicate exploitation attempts. 5. Conduct a thorough code review of the entire application to identify and remediate similar injection flaws. 6. Engage with the vendor or community to obtain or develop official patches or updates addressing this vulnerability. 7. Educate IT and security teams on secure coding practices and the importance of timely patching. 8. If patching is not immediately possible, deploy Web Application Firewalls (WAF) with custom rules to detect and block SQL injection payloads targeting the en_id parameter. 9. Regularly back up critical data and verify restoration procedures to minimize impact in case of data manipulation or loss. 10. Ensure compliance with GDPR by documenting the vulnerability, mitigation steps, and any incidents related to this flaw.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands
CVE-2025-13325: SQL Injection in itsourcecode Student Information System
Description
A vulnerability was determined in itsourcecode Student Information System 1.0. The affected element is an unknown function of the file /enrollment_edit1.php. Executing manipulation of the argument en_id can lead to sql injection. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized.
AI-Powered Analysis
Technical Analysis
CVE-2025-13325 identifies a SQL Injection vulnerability in the itsourcecode Student Information System version 1.0. The vulnerability resides in the /enrollment_edit1.php script, where the en_id parameter is improperly sanitized, allowing an attacker to inject malicious SQL code. This injection flaw can be exploited remotely without requiring authentication or user interaction, enabling attackers to manipulate backend database queries. Potential consequences include unauthorized retrieval, modification, or deletion of sensitive student records, which compromises data confidentiality and integrity. The vulnerability has a CVSS 4.0 base score of 5.3, reflecting medium severity due to the lack of authentication but limited impact scope and complexity. Although no active exploits are reported, the public disclosure increases the risk of exploitation by threat actors. The vulnerability affects only version 1.0 of the software, and no official patches have been published yet. The attack vector is network-based, and the vulnerability does not require social engineering, making it accessible to remote attackers scanning for vulnerable endpoints. The lack of secure coding practices, such as parameterized queries or prepared statements, is the root cause. This vulnerability is particularly critical for educational institutions relying on this system to manage enrollment and student data, as exploitation could lead to data breaches and regulatory non-compliance.
Potential Impact
For European organizations, particularly educational institutions using the itsourcecode Student Information System 1.0, this vulnerability poses a significant risk to the confidentiality and integrity of student data. Exploitation could lead to unauthorized disclosure of personal information, manipulation of enrollment records, or disruption of student services. Such incidents could result in reputational damage, legal penalties under GDPR, and loss of trust from students and stakeholders. The remote and unauthenticated nature of the attack increases the likelihood of exploitation, especially in environments with exposed web interfaces and insufficient network segmentation. Additionally, the medium severity score suggests that while the impact is serious, it may not lead to full system compromise or widespread service disruption. However, the educational sector's critical role and the sensitivity of the data involved elevate the importance of timely mitigation. Organizations with limited cybersecurity resources or outdated software management practices are particularly vulnerable. The lack of an official patch increases the window of exposure, necessitating immediate compensating controls.
Mitigation Recommendations
1. Implement immediate input validation and sanitization on the en_id parameter to prevent injection of malicious SQL code. 2. Refactor the vulnerable code to use parameterized queries or prepared statements, eliminating direct concatenation of user inputs into SQL commands. 3. Restrict access to the /enrollment_edit1.php endpoint through network segmentation, firewall rules, or VPN access to limit exposure. 4. Monitor database logs and web server access logs for unusual query patterns or repeated failed attempts that may indicate exploitation attempts. 5. Conduct a thorough code review of the entire application to identify and remediate similar injection flaws. 6. Engage with the vendor or community to obtain or develop official patches or updates addressing this vulnerability. 7. Educate IT and security teams on secure coding practices and the importance of timely patching. 8. If patching is not immediately possible, deploy Web Application Firewalls (WAF) with custom rules to detect and block SQL injection payloads targeting the en_id parameter. 9. Regularly back up critical data and verify restoration procedures to minimize impact in case of data manipulation or loss. 10. Ensure compliance with GDPR by documenting the vulnerability, mitigation steps, and any incidents related to this flaw.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-17T17:27:25.584Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 691bb966d4c3ef3c7a51160c
Added to database: 11/18/2025, 12:10:14 AM
Last enriched: 11/18/2025, 12:15:15 AM
Last updated: 11/18/2025, 7:29:25 AM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-7623: CWE-121: Stack-based Buffer Overflow in SMCI SYS-111C-NR
MediumCVE-2025-8076: CWE-121: Stack-based Buffer Overflow in SMCI MBD-X13SEDW-F
HighKongTuke activity, (Tue, Nov 18th)
MediumCVE-2025-12524: CWE-639 Authorization Bypass Through User-Controlled Key in johnjamesjacoby Post Type Switcher
MediumCVE-2025-48593: Remote code execution in Google Android
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.