Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13468: Missing Authorization in SourceCodester Alumni Management System

0
Medium
VulnerabilityCVE-2025-13468cvecve-2025-13468
Published: Thu Nov 20 2025 (11/20/2025, 13:32:08 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: Alumni Management System

Description

A weakness has been identified in SourceCodester Alumni Management System 1.0. This issue affects the function delete_forum/delete_career/delete_comment/delete_gallery/delete_event of the file admin/admin_class.php of the component Delete Handler. Executing manipulation of the argument ID can lead to missing authorization. It is possible to launch the attack remotely. The exploit has been made available to the public and could be exploited.

AI-Powered Analysis

AILast updated: 11/20/2025, 13:55:48 UTC

Technical Analysis

CVE-2025-13468 identifies a missing authorization vulnerability in SourceCodester Alumni Management System version 1.0. The flaw exists in the delete handler functions (delete_forum, delete_career, delete_comment, delete_gallery, delete_event) located in the admin/admin_class.php file. These functions fail to properly verify whether the user initiating the delete request has the necessary permissions. By manipulating the ID parameter remotely, an attacker can delete various types of data entries without authentication or user interaction. The vulnerability has a CVSS 4.0 base score of 5.3 (medium severity), reflecting its network attack vector, low complexity, no privileges required, and no user interaction needed. The impact includes unauthorized data deletion, which compromises data integrity and availability, and may indirectly affect confidentiality if sensitive data is removed or altered. Although no active exploits are reported in the wild, public exploit code availability increases the risk of exploitation. The vulnerability affects only version 1.0 of the product, which is used primarily by educational institutions and alumni organizations to manage community data. The lack of authorization checks in critical delete functions represents a significant security oversight that could disrupt organizational operations and damage trust in the system.

Potential Impact

For European organizations, particularly educational institutions and alumni associations using SourceCodester Alumni Management System 1.0, this vulnerability poses a risk of unauthorized data deletion. This can lead to loss of important community data such as forum discussions, career postings, event information, and user comments, impacting operational continuity and user trust. The integrity and availability of data are directly threatened, potentially causing reputational damage and administrative burdens to restore lost information. Since the attack can be launched remotely without authentication or user interaction, the threat surface is broad, increasing the likelihood of exploitation. Disruption of alumni and educational community platforms could also affect collaboration and communication within these organizations. The medium severity rating suggests moderate impact but ease of exploitation warrants prompt attention to prevent potential misuse.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately implement strict authorization checks on all delete operations within the admin/admin_class.php file, ensuring that only authenticated and authorized users can perform deletions. Code review and security testing should be conducted to verify that all sensitive functions enforce proper access controls. If possible, upgrade to a patched version of the software once available or apply vendor-provided patches. In the absence of patches, consider deploying web application firewalls (WAFs) with custom rules to detect and block suspicious delete requests with manipulated ID parameters. Regularly monitor logs for unusual deletion activity and establish alerting mechanisms. Additionally, maintain regular backups of all critical data to enable recovery in case of unauthorized deletions. Educate administrative users about the risks and encourage strong credential management to reduce the risk of credential compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-20T06:58:09.831Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691f1a653e6177767e7adff1

Added to database: 11/20/2025, 1:40:53 PM

Last enriched: 11/20/2025, 1:55:48 PM

Last updated: 11/20/2025, 8:25:22 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats