CVE-2025-13560: SQL Injection in SourceCodester Company Website CMS
A vulnerability was found in SourceCodester Company Website CMS 1.0. This affects an unknown part of the file /admin/reset-password.php. The manipulation of the argument email results in sql injection. The attack may be launched remotely. The exploit has been made public and could be used.
AI Analysis
Technical Summary
CVE-2025-13560 is a SQL injection vulnerability identified in SourceCodester Company Website CMS version 1.0, located in the /admin/reset-password.php script. The vulnerability arises from improper sanitization of the 'email' parameter, which is directly used in SQL queries, allowing an attacker to inject malicious SQL code. This flaw can be exploited remotely without requiring authentication or user interaction, enabling attackers to manipulate database queries. Potential impacts include unauthorized retrieval, modification, or deletion of sensitive data stored in the CMS database, such as user credentials or company information. The vulnerability has a CVSS 4.0 base score of 6.9 (medium severity), reflecting its network attack vector, low complexity, and no required privileges or user interaction, but limited impact on confidentiality, integrity, and availability. Although no known exploits are currently active in the wild, the public availability of exploit code increases the risk of exploitation. The lack of patches or vendor advisories necessitates immediate mitigation efforts by organizations using this CMS. The vulnerability highlights the critical need for secure coding practices, particularly input validation and parameterized queries, in web applications handling sensitive operations like password resets.
Potential Impact
For European organizations using SourceCodester Company Website CMS 1.0, this vulnerability poses a significant risk of unauthorized data access and potential data breaches. Exploitation could lead to exposure of user credentials, company data, and other sensitive information, undermining confidentiality. Attackers might also alter or delete data, affecting data integrity and potentially disrupting website availability. This can result in reputational damage, regulatory penalties under GDPR for data breaches, and operational downtime. Sectors such as small and medium enterprises relying on this CMS for their web presence are particularly vulnerable. The remote and unauthenticated nature of the exploit increases the attack surface, making it easier for threat actors to target European organizations without initial access. The absence of known active exploits provides a window for mitigation, but the public exploit code availability elevates urgency. Overall, the threat could impact business continuity and compliance posture across affected European entities.
Mitigation Recommendations
1. Immediately review and sanitize all inputs to the /admin/reset-password.php script, especially the 'email' parameter, using parameterized queries or prepared statements to prevent SQL injection. 2. Conduct a comprehensive code audit of the entire CMS to identify and remediate similar injection flaws. 3. Implement a Web Application Firewall (WAF) with rules specifically designed to detect and block SQL injection attempts targeting this CMS. 4. Monitor web server and application logs for unusual or suspicious requests to the reset-password endpoint. 5. Restrict access to the /admin directory via IP whitelisting or VPN where feasible to reduce exposure. 6. If possible, upgrade to a newer, patched version of the CMS or apply vendor-provided patches once available. 7. Educate administrators on the risks of SQL injection and the importance of secure coding practices. 8. Regularly back up CMS databases and test restoration procedures to minimize impact of potential data loss. 9. Consider deploying runtime application self-protection (RASP) tools to detect and block injection attacks in real time. 10. Engage with the vendor or community to track patch releases and threat intelligence related to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-13560: SQL Injection in SourceCodester Company Website CMS
Description
A vulnerability was found in SourceCodester Company Website CMS 1.0. This affects an unknown part of the file /admin/reset-password.php. The manipulation of the argument email results in sql injection. The attack may be launched remotely. The exploit has been made public and could be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-13560 is a SQL injection vulnerability identified in SourceCodester Company Website CMS version 1.0, located in the /admin/reset-password.php script. The vulnerability arises from improper sanitization of the 'email' parameter, which is directly used in SQL queries, allowing an attacker to inject malicious SQL code. This flaw can be exploited remotely without requiring authentication or user interaction, enabling attackers to manipulate database queries. Potential impacts include unauthorized retrieval, modification, or deletion of sensitive data stored in the CMS database, such as user credentials or company information. The vulnerability has a CVSS 4.0 base score of 6.9 (medium severity), reflecting its network attack vector, low complexity, and no required privileges or user interaction, but limited impact on confidentiality, integrity, and availability. Although no known exploits are currently active in the wild, the public availability of exploit code increases the risk of exploitation. The lack of patches or vendor advisories necessitates immediate mitigation efforts by organizations using this CMS. The vulnerability highlights the critical need for secure coding practices, particularly input validation and parameterized queries, in web applications handling sensitive operations like password resets.
Potential Impact
For European organizations using SourceCodester Company Website CMS 1.0, this vulnerability poses a significant risk of unauthorized data access and potential data breaches. Exploitation could lead to exposure of user credentials, company data, and other sensitive information, undermining confidentiality. Attackers might also alter or delete data, affecting data integrity and potentially disrupting website availability. This can result in reputational damage, regulatory penalties under GDPR for data breaches, and operational downtime. Sectors such as small and medium enterprises relying on this CMS for their web presence are particularly vulnerable. The remote and unauthenticated nature of the exploit increases the attack surface, making it easier for threat actors to target European organizations without initial access. The absence of known active exploits provides a window for mitigation, but the public exploit code availability elevates urgency. Overall, the threat could impact business continuity and compliance posture across affected European entities.
Mitigation Recommendations
1. Immediately review and sanitize all inputs to the /admin/reset-password.php script, especially the 'email' parameter, using parameterized queries or prepared statements to prevent SQL injection. 2. Conduct a comprehensive code audit of the entire CMS to identify and remediate similar injection flaws. 3. Implement a Web Application Firewall (WAF) with rules specifically designed to detect and block SQL injection attempts targeting this CMS. 4. Monitor web server and application logs for unusual or suspicious requests to the reset-password endpoint. 5. Restrict access to the /admin directory via IP whitelisting or VPN where feasible to reduce exposure. 6. If possible, upgrade to a newer, patched version of the CMS or apply vendor-provided patches once available. 7. Educate administrators on the risks of SQL injection and the importance of secure coding practices. 8. Regularly back up CMS databases and test restoration procedures to minimize impact of potential data loss. 9. Consider deploying runtime application self-protection (RASP) tools to detect and block injection attacks in real time. 10. Engage with the vendor or community to track patch releases and threat intelligence related to this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-22T16:51:41.898Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69233fd377ebf6e86e532d55
Added to database: 11/23/2025, 5:09:39 PM
Last enriched: 11/23/2025, 5:23:36 PM
Last updated: 11/23/2025, 8:22:03 PM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13567: SQL Injection in itsourcecode COVID Tracking System
MediumCVE-2025-13566: Double Free in jarun nnn
MediumCVE-2025-13565: Weak Password Recovery in SourceCodester Inventory Management System
MediumCVE-2025-13564: Denial of Service in SourceCodester Pre-School Management System
MediumCVE-2025-13562: Command Injection in D-Link DIR-852
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.