Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13346: SQL Injection in SourceCodester Train Station Ticketing System

0
Medium
VulnerabilityCVE-2025-13346cvecve-2025-13346
Published: Tue Nov 18 2025 (11/18/2025, 12:32:06 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: Train Station Ticketing System

Description

A vulnerability was detected in SourceCodester Train Station Ticketing System 1.0. This affects an unknown part of the file /ajax.php?action=save_station. Performing manipulation of the argument id/station results in sql injection. The attack may be initiated remotely. The exploit is now public and may be used.

AI-Powered Analysis

AILast updated: 11/25/2025, 13:09:42 UTC

Technical Analysis

CVE-2025-13346 identifies a SQL injection vulnerability in SourceCodester Train Station Ticketing System version 1.0, specifically in the /ajax.php?action=save_station endpoint. The vulnerability arises from insufficient input validation on the id and station parameters, allowing an attacker to inject malicious SQL code remotely without requiring authentication or user interaction. This injection can lead to unauthorized reading, modification, or deletion of database records, potentially compromising sensitive ticketing information and operational data. The vulnerability has a CVSS 4.0 score of 5.3 (medium severity), reflecting its network attack vector, low attack complexity, no privileges required, and no user interaction needed, but limited impact on confidentiality, integrity, and availability. Although no active exploitation has been reported, the public availability of an exploit increases the risk of attacks. The affected software is used in train station ticketing systems, which are critical for transportation management and passenger services. Exploitation could disrupt ticket sales, cause data breaches of passenger information, and undermine trust in transportation services. The lack of official patches or vendor advisories necessitates immediate defensive measures by users. The vulnerability highlights the importance of secure coding practices such as parameterized queries and rigorous input validation to prevent injection flaws in web applications handling critical infrastructure data.

Potential Impact

For European organizations, especially those operating or managing train station ticketing systems, this vulnerability poses a significant risk to operational continuity and data security. Exploitation could lead to unauthorized access to passenger data, ticketing records, and potentially financial information, resulting in privacy violations and regulatory non-compliance under GDPR. Integrity of ticketing data could be compromised, causing incorrect ticket issuance or revenue loss. Availability impacts could disrupt ticketing services, leading to passenger dissatisfaction and operational delays. Given the critical role of rail transport in Europe, such disruptions could have cascading effects on public transportation networks and economic activities. Furthermore, attackers could leverage this vulnerability as a foothold for further network intrusion or lateral movement within transportation infrastructure. The public availability of exploits increases the urgency for European entities to address this vulnerability promptly to avoid reputational damage and potential legal consequences.

Mitigation Recommendations

1. Immediately implement input validation and sanitization on all parameters, especially id and station, to reject malicious SQL syntax. 2. Refactor the vulnerable code to use parameterized queries or prepared statements to prevent SQL injection. 3. Restrict database user permissions to the minimum necessary to limit the impact of any injection. 4. Monitor web application logs and network traffic for unusual activity targeting /ajax.php?action=save_station. 5. Deploy web application firewalls (WAFs) with rules to detect and block SQL injection attempts against the affected endpoint. 6. Conduct a thorough security audit of the entire ticketing system codebase to identify and remediate similar injection flaws. 7. If possible, isolate the ticketing system network segment to reduce exposure. 8. Engage with SourceCodester or community forums for any forthcoming patches or updates. 9. Train developers and administrators on secure coding practices and vulnerability management. 10. Prepare incident response plans specific to potential exploitation scenarios involving ticketing system compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-18T06:53:21.916Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691c6c69c50334694ab71ca7

Added to database: 11/18/2025, 12:54:01 PM

Last enriched: 11/25/2025, 1:09:42 PM

Last updated: 1/7/2026, 9:23:41 AM

Views: 57

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats