Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13570: SQL Injection in itsourcecode COVID Tracking System

0
Medium
VulnerabilityCVE-2025-13570cvecve-2025-13570
Published: Sun Nov 23 2025 (11/23/2025, 21:32:07 UTC)
Source: CVE Database V5
Vendor/Project: itsourcecode
Product: COVID Tracking System

Description

A vulnerability was found in itsourcecode COVID Tracking System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/?page=state. Performing manipulation of the argument ID results in sql injection. The attack may be initiated remotely. The exploit has been made public and could be used.

AI-Powered Analysis

AILast updated: 11/30/2025, 22:08:21 UTC

Technical Analysis

The vulnerability identified as CVE-2025-13570 affects the itsourcecode COVID Tracking System version 1.0. It is an SQL Injection flaw located in the /admin/?page=state endpoint, specifically through manipulation of the ID parameter. SQL Injection vulnerabilities allow attackers to inject malicious SQL statements into an application's database query, potentially leading to unauthorized data access, data modification, or denial of service. In this case, the vulnerability can be exploited remotely without user interaction but requires low-level privileges, indicating that an attacker must have some form of authenticated access, albeit minimal. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no user interaction (UI:N), and privileges required are low (PR:L). The impact on confidentiality, integrity, and availability is low individually but combined can lead to significant compromise of the system's backend data. The vulnerability has been publicly disclosed, and while no active exploitation in the wild has been reported, the availability of exploit code increases the risk. The lack of patches at the time of disclosure means organizations must rely on interim mitigations. The COVID Tracking System is critical for pandemic management, making any compromise potentially impactful on public health data integrity and availability.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to unauthorized access to sensitive COVID-19 tracking data, including potentially personal health information. This could result in breaches of GDPR and other data protection regulations, leading to legal and reputational damage. Integrity of the data could be compromised, affecting the accuracy of pandemic tracking and response efforts. Availability impacts could disrupt public health operations relying on this system. Given the critical nature of COVID tracking systems, even a medium severity vulnerability can have outsized effects on public health decision-making and trust. Organizations operating this software in healthcare, government, or research sectors are at particular risk. The exposure of sensitive data or manipulation of tracking information could also have broader societal impacts, including misinformation or delayed responses to outbreaks.

Mitigation Recommendations

1. Immediately restrict access to the /admin interface to trusted IP addresses or VPNs to limit exposure. 2. Implement strong input validation and sanitization on the ID parameter to prevent injection of malicious SQL code. 3. Apply parameterized queries or prepared statements in the backend code to eliminate direct concatenation of user input into SQL queries. 4. Monitor logs for unusual database query patterns or repeated failed attempts targeting the ID parameter. 5. Deploy Web Application Firewalls (WAF) with rules to detect and block SQL Injection attempts specifically targeting this endpoint. 6. Once available, promptly apply official patches or updates from itsourcecode to remediate the vulnerability. 7. Conduct security audits and penetration testing focusing on the admin interface and database interactions. 8. Educate administrators about the risk and signs of exploitation to enable rapid response. 9. Ensure backups of critical data are maintained and tested for recovery in case of data corruption or loss.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-22T19:03:25.738Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69238059f1913078bbfcf627

Added to database: 11/23/2025, 9:44:57 PM

Last enriched: 11/30/2025, 10:08:21 PM

Last updated: 1/8/2026, 8:14:49 PM

Views: 56

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats