Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13560: SQL Injection in SourceCodester Company Website CMS

0
Medium
VulnerabilityCVE-2025-13560cvecve-2025-13560
Published: Sun Nov 23 2025 (11/23/2025, 17:02:06 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: Company Website CMS

Description

A vulnerability was found in SourceCodester Company Website CMS 1.0. This affects an unknown part of the file /admin/reset-password.php. The manipulation of the argument email results in sql injection. The attack may be launched remotely. The exploit has been made public and could be used.

AI-Powered Analysis

AILast updated: 11/23/2025, 17:23:36 UTC

Technical Analysis

CVE-2025-13560 is a SQL injection vulnerability identified in SourceCodester Company Website CMS version 1.0, located in the /admin/reset-password.php script. The vulnerability arises from improper sanitization of the 'email' parameter, which is directly used in SQL queries, allowing an attacker to inject malicious SQL code. This flaw can be exploited remotely without requiring authentication or user interaction, enabling attackers to manipulate database queries. Potential impacts include unauthorized retrieval, modification, or deletion of sensitive data stored in the CMS database, such as user credentials or company information. The vulnerability has a CVSS 4.0 base score of 6.9 (medium severity), reflecting its network attack vector, low complexity, and no required privileges or user interaction, but limited impact on confidentiality, integrity, and availability. Although no known exploits are currently active in the wild, the public availability of exploit code increases the risk of exploitation. The lack of patches or vendor advisories necessitates immediate mitigation efforts by organizations using this CMS. The vulnerability highlights the critical need for secure coding practices, particularly input validation and parameterized queries, in web applications handling sensitive operations like password resets.

Potential Impact

For European organizations using SourceCodester Company Website CMS 1.0, this vulnerability poses a significant risk of unauthorized data access and potential data breaches. Exploitation could lead to exposure of user credentials, company data, and other sensitive information, undermining confidentiality. Attackers might also alter or delete data, affecting data integrity and potentially disrupting website availability. This can result in reputational damage, regulatory penalties under GDPR for data breaches, and operational downtime. Sectors such as small and medium enterprises relying on this CMS for their web presence are particularly vulnerable. The remote and unauthenticated nature of the exploit increases the attack surface, making it easier for threat actors to target European organizations without initial access. The absence of known active exploits provides a window for mitigation, but the public exploit code availability elevates urgency. Overall, the threat could impact business continuity and compliance posture across affected European entities.

Mitigation Recommendations

1. Immediately review and sanitize all inputs to the /admin/reset-password.php script, especially the 'email' parameter, using parameterized queries or prepared statements to prevent SQL injection. 2. Conduct a comprehensive code audit of the entire CMS to identify and remediate similar injection flaws. 3. Implement a Web Application Firewall (WAF) with rules specifically designed to detect and block SQL injection attempts targeting this CMS. 4. Monitor web server and application logs for unusual or suspicious requests to the reset-password endpoint. 5. Restrict access to the /admin directory via IP whitelisting or VPN where feasible to reduce exposure. 6. If possible, upgrade to a newer, patched version of the CMS or apply vendor-provided patches once available. 7. Educate administrators on the risks of SQL injection and the importance of secure coding practices. 8. Regularly back up CMS databases and test restoration procedures to minimize impact of potential data loss. 9. Consider deploying runtime application self-protection (RASP) tools to detect and block injection attacks in real time. 10. Engage with the vendor or community to track patch releases and threat intelligence related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-22T16:51:41.898Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69233fd377ebf6e86e532d55

Added to database: 11/23/2025, 5:09:39 PM

Last enriched: 11/23/2025, 5:23:36 PM

Last updated: 11/23/2025, 8:22:03 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats