CVE-2025-13567: SQL Injection in itsourcecode COVID Tracking System
A vulnerability was detected in itsourcecode COVID Tracking System 1.0. This affects an unknown function of the file /admin/?page=establishment. The manipulation of the argument ID results in sql injection. It is possible to launch the attack remotely. The exploit is now public and may be used.
AI Analysis
Technical Summary
CVE-2025-13567 identifies a SQL injection vulnerability in the itsourcecode COVID Tracking System version 1.0. The flaw exists in the /admin/?page=establishment endpoint, where the 'ID' parameter is not properly sanitized, allowing attackers to inject arbitrary SQL commands. This vulnerability can be exploited remotely without authentication or user interaction, indicating a low barrier to attack. The CVSS 4.0 score of 5.3 reflects a medium severity, considering the attack vector is network-based, with low complexity and no privileges or user interaction required. The impact on confidentiality, integrity, and availability is limited but present, as attackers could read or modify data within the database, potentially exposing sensitive health information or disrupting system operations. Although no known exploits are currently active in the wild, the public disclosure of exploit code increases the likelihood of exploitation attempts. The vulnerability affects only version 1.0 of the product, and no patches have been published yet. The COVID Tracking System is likely deployed in healthcare or governmental environments to monitor pandemic-related data, making the data sensitivity and operational continuity critical. The lack of authentication requirements for exploitation heightens the risk, especially if administrative interfaces are exposed to the internet. The vulnerability underscores the importance of secure coding practices such as input validation and the use of parameterized queries to prevent injection flaws.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of sensitive health data collected and managed by the COVID Tracking System. Unauthorized SQL injection attacks could lead to data breaches exposing personal health information, undermining public trust and potentially violating GDPR regulations. Integrity attacks could alter tracking data, affecting public health decisions and responses. Availability could also be impacted if attackers manipulate or delete critical data, disrupting pandemic monitoring efforts. Healthcare providers, government agencies, and public health organizations using this software are particularly vulnerable. The remote, unauthenticated nature of the exploit increases the attack surface, especially if administrative interfaces are not properly secured or segmented. The medium severity rating suggests that while the impact is notable, it may not lead to full system compromise or widespread disruption unless combined with other vulnerabilities. However, the critical nature of health data and pandemic tracking elevates the operational risk. European entities must consider the reputational, legal, and operational consequences of exploitation, including potential fines under data protection laws and loss of public confidence.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately audit and restrict access to the /admin interface, ensuring it is not exposed to the public internet or is protected by strong network controls such as VPNs or IP whitelisting. Implement input validation and sanitization on the 'ID' parameter to reject malicious input. Refactor the backend code to use parameterized queries or prepared statements to eliminate SQL injection vectors. Conduct a comprehensive security review of the entire application to identify and remediate similar injection flaws. Monitor logs for suspicious database queries or access patterns indicative of exploitation attempts. If possible, upgrade to a patched version once available or apply vendor-provided fixes promptly. Employ web application firewalls (WAFs) with rules targeting SQL injection signatures as a temporary protective measure. Train development teams on secure coding practices to prevent future injection vulnerabilities. Finally, ensure that sensitive health data is encrypted at rest and in transit to reduce the impact of potential data exposure.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Netherlands, Belgium, Sweden
CVE-2025-13567: SQL Injection in itsourcecode COVID Tracking System
Description
A vulnerability was detected in itsourcecode COVID Tracking System 1.0. This affects an unknown function of the file /admin/?page=establishment. The manipulation of the argument ID results in sql injection. It is possible to launch the attack remotely. The exploit is now public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-13567 identifies a SQL injection vulnerability in the itsourcecode COVID Tracking System version 1.0. The flaw exists in the /admin/?page=establishment endpoint, where the 'ID' parameter is not properly sanitized, allowing attackers to inject arbitrary SQL commands. This vulnerability can be exploited remotely without authentication or user interaction, indicating a low barrier to attack. The CVSS 4.0 score of 5.3 reflects a medium severity, considering the attack vector is network-based, with low complexity and no privileges or user interaction required. The impact on confidentiality, integrity, and availability is limited but present, as attackers could read or modify data within the database, potentially exposing sensitive health information or disrupting system operations. Although no known exploits are currently active in the wild, the public disclosure of exploit code increases the likelihood of exploitation attempts. The vulnerability affects only version 1.0 of the product, and no patches have been published yet. The COVID Tracking System is likely deployed in healthcare or governmental environments to monitor pandemic-related data, making the data sensitivity and operational continuity critical. The lack of authentication requirements for exploitation heightens the risk, especially if administrative interfaces are exposed to the internet. The vulnerability underscores the importance of secure coding practices such as input validation and the use of parameterized queries to prevent injection flaws.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of sensitive health data collected and managed by the COVID Tracking System. Unauthorized SQL injection attacks could lead to data breaches exposing personal health information, undermining public trust and potentially violating GDPR regulations. Integrity attacks could alter tracking data, affecting public health decisions and responses. Availability could also be impacted if attackers manipulate or delete critical data, disrupting pandemic monitoring efforts. Healthcare providers, government agencies, and public health organizations using this software are particularly vulnerable. The remote, unauthenticated nature of the exploit increases the attack surface, especially if administrative interfaces are not properly secured or segmented. The medium severity rating suggests that while the impact is notable, it may not lead to full system compromise or widespread disruption unless combined with other vulnerabilities. However, the critical nature of health data and pandemic tracking elevates the operational risk. European entities must consider the reputational, legal, and operational consequences of exploitation, including potential fines under data protection laws and loss of public confidence.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately audit and restrict access to the /admin interface, ensuring it is not exposed to the public internet or is protected by strong network controls such as VPNs or IP whitelisting. Implement input validation and sanitization on the 'ID' parameter to reject malicious input. Refactor the backend code to use parameterized queries or prepared statements to eliminate SQL injection vectors. Conduct a comprehensive security review of the entire application to identify and remediate similar injection flaws. Monitor logs for suspicious database queries or access patterns indicative of exploitation attempts. If possible, upgrade to a patched version once available or apply vendor-provided fixes promptly. Employ web application firewalls (WAFs) with rules targeting SQL injection signatures as a temporary protective measure. Train development teams on secure coding practices to prevent future injection vulnerabilities. Finally, ensure that sensitive health data is encrypted at rest and in transit to reduce the impact of potential data exposure.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-22T19:03:15.330Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69236ac46d4acfe6c0ac2364
Added to database: 11/23/2025, 8:12:52 PM
Last enriched: 11/30/2025, 9:03:32 PM
Last updated: 1/10/2026, 10:09:47 PM
Views: 65
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0824: Cross Site Scripting in questdb ui
MediumCVE-2025-13393: CWE-918 Server-Side Request Forgery (SSRF) in marceljm Featured Image from URL (FIFU)
MediumCVE-2025-12379: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in averta Shortcodes and extra features for Phlox theme
MediumCVE-2026-0822: Heap-based Buffer Overflow in quickjs-ng quickjs
MediumCVE-2026-0821: Heap-based Buffer Overflow in quickjs-ng quickjs
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.