Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13561: SQL Injection in SourceCodester Company Website CMS

0
Medium
VulnerabilityCVE-2025-13561cvecve-2025-13561
Published: Sun Nov 23 2025 (11/23/2025, 17:32:05 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: Company Website CMS

Description

A vulnerability was determined in SourceCodester Company Website CMS 1.0. This vulnerability affects unknown code of the file /admin/index.php. This manipulation of the argument Username causes sql injection. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized.

AI-Powered Analysis

AILast updated: 11/30/2025, 18:13:42 UTC

Technical Analysis

CVE-2025-13561 is a SQL injection vulnerability identified in SourceCodester Company Website CMS version 1.0, affecting the /admin/index.php file. The vulnerability arises from improper sanitization of the Username parameter, allowing attackers to inject malicious SQL code remotely without authentication or user interaction. This flaw enables attackers to manipulate backend database queries, potentially leading to unauthorized data disclosure, data modification, or even full database compromise depending on the database privileges. The vulnerability was publicly disclosed shortly after discovery, increasing the risk of exploitation despite no known active exploits currently. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability at low levels (VC:L, VI:L, VA:L). The lack of authentication requirement and remote exploitability make this vulnerability significant for any organization running this CMS, especially if the admin interface is internet-facing. The absence of official patches or mitigations at the time of disclosure necessitates immediate defensive measures. The vulnerability’s exploitation could allow attackers to extract sensitive data, alter website content, or disrupt services, posing risks to organizational operations and data privacy.

Potential Impact

For European organizations using SourceCodester Company Website CMS 1.0, this vulnerability could lead to unauthorized access to sensitive administrative data, including user credentials and internal configurations. The SQL injection could be leveraged to extract customer data, intellectual property, or financial information, resulting in data breaches and regulatory non-compliance under GDPR. Integrity of website content and backend data could be compromised, potentially damaging organizational reputation and trust. Availability impacts, while rated low, could still manifest if attackers execute destructive SQL commands. The ease of remote exploitation without authentication increases the threat surface, especially for organizations with publicly accessible admin portals. This vulnerability could also serve as a foothold for further network intrusion or lateral movement within corporate environments. The potential financial and operational impacts underscore the need for swift mitigation, particularly in sectors with high data sensitivity such as finance, healthcare, and government services in Europe.

Mitigation Recommendations

1. Immediately restrict access to the /admin/index.php interface using network-level controls such as IP whitelisting, VPNs, or web application firewalls (WAFs) to limit exposure. 2. Implement strict input validation and sanitization on the Username parameter, employing parameterized queries or prepared statements to prevent SQL injection. 3. Monitor web server and database logs for anomalous queries or repeated failed login attempts indicative of exploitation attempts. 4. If possible, upgrade to a patched version of the CMS once available or apply vendor-provided fixes promptly. 5. Conduct a thorough security audit of all web-facing applications to identify similar injection flaws. 6. Employ runtime application self-protection (RASP) tools to detect and block injection attacks in real-time. 7. Educate development and operations teams on secure coding practices to prevent recurrence. 8. Regularly back up databases and verify restoration procedures to minimize impact from potential data manipulation or destruction. 9. Consider deploying database activity monitoring solutions to alert on suspicious queries. 10. Engage in threat intelligence sharing with industry peers to stay informed about emerging exploits targeting this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-22T16:57:13.600Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 692349eba8cb427b79efb919

Added to database: 11/23/2025, 5:52:43 PM

Last enriched: 11/30/2025, 6:13:42 PM

Last updated: 1/8/2026, 2:29:20 PM

Views: 54

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats