Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13560: SQL Injection in SourceCodester Company Website CMS

0
Medium
VulnerabilityCVE-2025-13560cvecve-2025-13560
Published: Sun Nov 23 2025 (11/23/2025, 17:02:06 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: Company Website CMS

Description

A vulnerability was found in SourceCodester Company Website CMS 1.0. This affects an unknown part of the file /admin/reset-password.php. The manipulation of the argument email results in sql injection. The attack may be launched remotely. The exploit has been made public and could be used.

AI-Powered Analysis

AILast updated: 11/30/2025, 18:17:39 UTC

Technical Analysis

CVE-2025-13560 is a SQL injection vulnerability identified in SourceCodester Company Website CMS version 1.0, specifically affecting the /admin/reset-password.php script. The vulnerability stems from improper handling of the 'email' parameter, which is susceptible to SQL injection attacks due to lack of adequate input sanitization or use of parameterized queries. An attacker can remotely exploit this flaw without requiring authentication or user interaction, by crafting malicious input that alters the intended SQL query logic. This can lead to unauthorized access to sensitive data stored in the CMS database, including user credentials or other confidential information, and potentially allow modification or deletion of data. The vulnerability has a CVSS 4.0 base score of 6.9, indicating a medium severity level, with network attack vector, low complexity, and no privileges or user interaction needed. Although no exploits have been observed in the wild yet, the public availability of exploit code increases the risk of exploitation. The vulnerability affects only version 1.0 of the CMS, and no official patches have been linked yet. The threat is particularly relevant for organizations using this CMS for their corporate websites, especially if the admin interface is exposed to the internet. Attackers could leverage this vulnerability to compromise the website’s backend database, potentially leading to data breaches or website defacement. The lack of authentication requirement and ease of exploitation make this a notable risk for affected deployments.

Potential Impact

For European organizations using SourceCodester Company Website CMS 1.0, this vulnerability poses a significant risk to the confidentiality, integrity, and availability of their website data. Exploitation could lead to unauthorized disclosure of sensitive information such as user credentials, company data, or customer information. Data integrity could be compromised if attackers modify or delete database records, potentially disrupting business operations or damaging reputation. Availability could also be impacted if attackers execute destructive queries or cause database errors. Given the remote and unauthenticated nature of the exploit, any publicly accessible admin reset-password endpoint increases exposure. SMEs and companies relying on this CMS for their online presence are particularly vulnerable, as they may lack dedicated security resources. The public release of exploit code raises the likelihood of opportunistic attacks, increasing the urgency for mitigation. Additionally, compromised websites could be used as a foothold for further attacks or to distribute malware, amplifying the threat impact.

Mitigation Recommendations

1. Immediately implement input validation and sanitization on the 'email' parameter in /admin/reset-password.php to prevent SQL injection. 2. Refactor the code to use parameterized queries or prepared statements for all database interactions involving user input. 3. Restrict access to the reset-password functionality by limiting it to trusted IP addresses or requiring authentication where feasible. 4. Monitor web server and application logs for suspicious activity targeting the reset-password endpoint. 5. If possible, upgrade to a patched version of the CMS once available or apply vendor-provided patches promptly. 6. Employ Web Application Firewalls (WAFs) with SQL injection detection rules to provide an additional layer of defense. 7. Conduct a thorough security audit of the CMS installation to identify and remediate any other potential vulnerabilities. 8. Educate administrators about the risks of exposing admin interfaces publicly and encourage best practices for secure deployment. 9. Backup the CMS database regularly to enable recovery in case of compromise. 10. Consider migrating to more secure and actively maintained CMS platforms if feasible.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-22T16:51:41.898Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69233fd377ebf6e86e532d55

Added to database: 11/23/2025, 5:09:39 PM

Last enriched: 11/30/2025, 6:17:39 PM

Last updated: 1/8/2026, 1:59:18 PM

Views: 56

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats