Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13570: SQL Injection in itsourcecode COVID Tracking System

0
Medium
VulnerabilityCVE-2025-13570cvecve-2025-13570
Published: Sun Nov 23 2025 (11/23/2025, 21:32:07 UTC)
Source: CVE Database V5
Vendor/Project: itsourcecode
Product: COVID Tracking System

Description

A vulnerability was found in itsourcecode COVID Tracking System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/?page=state. Performing manipulation of the argument ID results in sql injection. The attack may be initiated remotely. The exploit has been made public and could be used.

AI-Powered Analysis

AILast updated: 11/23/2025, 22:00:04 UTC

Technical Analysis

The vulnerability identified as CVE-2025-13570 affects the itsourcecode COVID Tracking System version 1.0. It is an SQL injection flaw located in the /admin/?page=state endpoint, where the 'ID' parameter can be manipulated by an attacker. This manipulation allows the injection of malicious SQL code, potentially enabling unauthorized database queries. The attack vector is remote network access, requiring limited privileges (PR:L) but no user interaction (UI:N). The CVSS 4.0 vector indicates low complexity (AC:L), no authentication bypass (AT:N), and low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). The vulnerability does not affect system components like scope or security features (SC:N, SI:N, SA:N). Although no known exploits are currently active in the wild, the public availability of exploit code increases the risk of exploitation. The vulnerability could allow attackers to extract sensitive data, modify records, or disrupt the system's operation, which is critical given the health-related nature of the application. The lack of official patches necessitates immediate mitigation efforts by affected organizations. The vulnerability's presence in a COVID tracking system underscores the importance of securing health data management platforms against injection attacks.

Potential Impact

For European organizations, this vulnerability poses a risk to the confidentiality and integrity of sensitive health data managed by the COVID Tracking System. Exploitation could lead to unauthorized disclosure of personal health information, manipulation of tracking data, or disruption of pandemic response efforts. Such breaches could undermine public trust, violate GDPR regulations, and result in significant legal and financial consequences. Healthcare providers, public health agencies, and government bodies using this software are particularly vulnerable. The medium severity suggests that while the impact is serious, it may not cause widespread system outages but could facilitate targeted data breaches or misinformation. The remote attack vector increases the risk of exploitation from external threat actors, including cybercriminals or state-sponsored groups interested in health data. The lack of authentication bypass means attackers need some level of access, but given the administrative context, this may still be achievable through credential compromise or insider threats. Overall, the vulnerability could disrupt critical health monitoring infrastructure in Europe if not addressed promptly.

Mitigation Recommendations

Organizations should immediately audit and restrict access to the /admin interface of the COVID Tracking System, ensuring only trusted administrators can reach it. Implement strict input validation and sanitization on the 'ID' parameter to prevent SQL injection. Where possible, refactor the application code to use parameterized queries or prepared statements to eliminate injection vectors. Monitor logs for unusual database queries or access patterns indicative of exploitation attempts. Employ network segmentation and firewall rules to limit exposure of the admin interface to internal networks or VPN access only. Conduct regular security assessments and penetration testing focused on injection vulnerabilities. If vendor patches become available, prioritize their deployment. Additionally, implement multi-factor authentication for admin accounts to reduce the risk of credential compromise. Educate administrators about phishing and social engineering risks that could lead to privilege escalation. Finally, maintain up-to-date backups of the system to enable recovery in case of data manipulation or destruction.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-22T19:03:25.738Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69238059f1913078bbfcf627

Added to database: 11/23/2025, 9:44:57 PM

Last enriched: 11/23/2025, 10:00:04 PM

Last updated: 11/24/2025, 12:50:46 PM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats