CVE-2025-13347: SQL Injection in SourceCodester Train Station Ticketing System
A flaw has been found in SourceCodester Train Station Ticketing System 1.0. This vulnerability affects unknown code of the file /ajax.php?action=save_user. Executing manipulation of the argument Username can lead to sql injection. The attack may be launched remotely. The exploit has been published and may be used.
AI Analysis
Technical Summary
CVE-2025-13347 is a SQL injection vulnerability identified in SourceCodester Train Station Ticketing System version 1.0. The vulnerability resides in the /ajax.php endpoint when the 'action' parameter is set to 'save_user'. Specifically, the 'Username' argument is not properly sanitized or validated, allowing an attacker to inject malicious SQL code. This flaw can be exploited remotely without requiring authentication or user interaction, making it accessible to a wide range of attackers. The vulnerability could allow attackers to manipulate backend database queries, potentially leading to unauthorized data access, modification, or deletion. The CVSS 4.0 vector indicates low complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and partial impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although no known exploits are currently active in the wild, the publication of exploit code increases the risk of exploitation. The vulnerability affects only version 1.0 of the product, which is used for managing train station ticketing operations, a critical function in transportation infrastructure. The lack of available patches or vendor advisories necessitates immediate defensive measures by users of this software.
Potential Impact
For European organizations, particularly those involved in public transportation and ticketing services, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to sensitive customer data, including personal information and ticketing details, potentially violating GDPR and other data protection regulations. Attackers could alter ticketing data, causing financial losses or service disruptions. The integrity of ticketing transactions could be compromised, leading to revenue loss and reputational damage. Availability of the ticketing system could also be affected if attackers execute destructive SQL commands or cause database corruption. Given the critical role of train station ticketing systems in European transport networks, successful exploitation could disrupt passenger services and erode public trust. Moreover, the remote and unauthenticated nature of the attack vector increases the likelihood of widespread exploitation if unmitigated.
Mitigation Recommendations
Organizations should immediately audit and sanitize all inputs to the /ajax.php?action=save_user endpoint, implementing parameterized queries or prepared statements to prevent SQL injection. Deploying a Web Application Firewall (WAF) with rules targeting SQL injection patterns can provide an additional layer of defense. Monitoring logs for unusual database query patterns or repeated failed attempts to manipulate the 'Username' parameter is critical for early detection. If possible, restrict access to the vulnerable endpoint through network segmentation or IP whitelisting. Organizations should also engage with the vendor or community to obtain patches or updates and apply them promptly once available. Conducting regular security assessments and penetration testing on the ticketing system will help identify similar vulnerabilities. Finally, ensure that backups of the database are current and tested to enable recovery in case of data corruption or loss.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden
CVE-2025-13347: SQL Injection in SourceCodester Train Station Ticketing System
Description
A flaw has been found in SourceCodester Train Station Ticketing System 1.0. This vulnerability affects unknown code of the file /ajax.php?action=save_user. Executing manipulation of the argument Username can lead to sql injection. The attack may be launched remotely. The exploit has been published and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-13347 is a SQL injection vulnerability identified in SourceCodester Train Station Ticketing System version 1.0. The vulnerability resides in the /ajax.php endpoint when the 'action' parameter is set to 'save_user'. Specifically, the 'Username' argument is not properly sanitized or validated, allowing an attacker to inject malicious SQL code. This flaw can be exploited remotely without requiring authentication or user interaction, making it accessible to a wide range of attackers. The vulnerability could allow attackers to manipulate backend database queries, potentially leading to unauthorized data access, modification, or deletion. The CVSS 4.0 vector indicates low complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and partial impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although no known exploits are currently active in the wild, the publication of exploit code increases the risk of exploitation. The vulnerability affects only version 1.0 of the product, which is used for managing train station ticketing operations, a critical function in transportation infrastructure. The lack of available patches or vendor advisories necessitates immediate defensive measures by users of this software.
Potential Impact
For European organizations, particularly those involved in public transportation and ticketing services, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to sensitive customer data, including personal information and ticketing details, potentially violating GDPR and other data protection regulations. Attackers could alter ticketing data, causing financial losses or service disruptions. The integrity of ticketing transactions could be compromised, leading to revenue loss and reputational damage. Availability of the ticketing system could also be affected if attackers execute destructive SQL commands or cause database corruption. Given the critical role of train station ticketing systems in European transport networks, successful exploitation could disrupt passenger services and erode public trust. Moreover, the remote and unauthenticated nature of the attack vector increases the likelihood of widespread exploitation if unmitigated.
Mitigation Recommendations
Organizations should immediately audit and sanitize all inputs to the /ajax.php?action=save_user endpoint, implementing parameterized queries or prepared statements to prevent SQL injection. Deploying a Web Application Firewall (WAF) with rules targeting SQL injection patterns can provide an additional layer of defense. Monitoring logs for unusual database query patterns or repeated failed attempts to manipulate the 'Username' parameter is critical for early detection. If possible, restrict access to the vulnerable endpoint through network segmentation or IP whitelisting. Organizations should also engage with the vendor or community to obtain patches or updates and apply them promptly once available. Conducting regular security assessments and penetration testing on the ticketing system will help identify similar vulnerabilities. Finally, ensure that backups of the database are current and tested to enable recovery in case of data corruption or loss.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-18T06:53:24.330Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 691c7a583fd37bbc3955e44c
Added to database: 11/18/2025, 1:53:28 PM
Last enriched: 11/18/2025, 1:55:42 PM
Last updated: 11/18/2025, 7:25:10 PM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-63226: n/a
UnknownCVE-2025-63994: n/a
HighCVE-2025-63695: n/a
HighCVE-2025-52639: CWE-201 Insertion of Sensitive Information Into Sent Data in HCL Software Connections
LowCVE-2025-37160: Vulnerability in Hewlett Packard Enterprise (HPE) HPE Aruba Networking AOS-CX
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.