Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13581: SQL Injection in itsourcecode Student Information System

0
Medium
VulnerabilityCVE-2025-13581cvecve-2025-13581
Published: Mon Nov 24 2025 (11/24/2025, 03:32:05 UTC)
Source: CVE Database V5
Vendor/Project: itsourcecode
Product: Student Information System

Description

A vulnerability was identified in itsourcecode Student Information System 1.0. Affected by this vulnerability is an unknown functionality of the file /schedule_edit1.php. Such manipulation of the argument schedule_id leads to sql injection. The attack may be launched remotely. The exploit is publicly available and might be used.

AI-Powered Analysis

AILast updated: 11/24/2025, 04:00:58 UTC

Technical Analysis

CVE-2025-13581 identifies a SQL injection vulnerability in the itsourcecode Student Information System version 1.0, specifically within the /schedule_edit1.php script. The vulnerability arises from improper sanitization of the schedule_id parameter, allowing an attacker to inject malicious SQL code remotely without requiring user interaction or elevated privileges beyond low-level access. This injection can manipulate backend SQL queries, potentially exposing or altering sensitive student data stored in the database. The vulnerability’s CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no authentication required (AT:N), no user interaction (UI:N), and low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although no exploits have been observed in the wild, a public exploit is available, increasing the risk of exploitation. The lack of patches or official remediation heightens urgency for organizations to implement mitigations. The vulnerability primarily threatens data confidentiality and integrity, with possible availability impacts if the database is manipulated or corrupted. Given the nature of student information systems, unauthorized access or modification could lead to privacy violations, regulatory non-compliance, and reputational damage. The vulnerability affects only version 1.0 of the product, suggesting that upgrading or patching could be effective if available.

Potential Impact

For European organizations, particularly educational institutions using the itsourcecode Student Information System 1.0, this vulnerability poses a risk of unauthorized data access and manipulation. Compromised student records could lead to breaches of personal data protected under GDPR, resulting in legal penalties and loss of trust. Integrity impacts could allow attackers to alter grades or schedules, disrupting academic operations. Availability impacts, while limited, could cause temporary denial of service if database queries are corrupted or cause errors. The remote, unauthenticated nature of the exploit increases the attack surface, especially for institutions with internet-facing portals. The presence of a public exploit raises the likelihood of opportunistic attacks. Organizations may face operational disruptions, regulatory scrutiny, and reputational harm if the vulnerability is exploited. The medium severity rating suggests moderate but non-critical risk, emphasizing the need for timely mitigation to prevent escalation.

Mitigation Recommendations

European organizations should implement specific mitigations beyond generic advice: 1) Immediately audit and sanitize all inputs to the /schedule_edit1.php endpoint, especially the schedule_id parameter, using strict whitelisting and validation techniques. 2) Refactor database queries to use parameterized statements or prepared queries to eliminate SQL injection vectors. 3) Restrict access to the vulnerable script by implementing network-level controls such as IP whitelisting or VPN access for administrative functions. 4) Monitor web application logs for anomalous query patterns or injection attempts targeting schedule_id. 5) If possible, upgrade to a newer, patched version of the Student Information System or apply vendor-provided patches once available. 6) Employ Web Application Firewalls (WAFs) configured to detect and block SQL injection payloads targeting this endpoint. 7) Conduct regular security assessments and penetration tests focused on injection vulnerabilities. 8) Educate IT staff and administrators about the risks and signs of SQL injection exploitation to enable rapid incident response.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-23T09:44:29.703Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6923d671a532ea377e9087ec

Added to database: 11/24/2025, 3:52:17 AM

Last enriched: 11/24/2025, 4:00:58 AM

Last updated: 11/24/2025, 4:24:22 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats