Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14334: SQL Injection in itsourcecode Student Management System

0
Medium
VulnerabilityCVE-2025-14334cvecve-2025-14334
Published: Tue Dec 09 2025 (12/09/2025, 18:32:07 UTC)
Source: CVE Database V5
Vendor/Project: itsourcecode
Product: Student Management System

Description

A flaw has been found in itsourcecode Student Management System 1.0. Affected is an unknown function of the file /new_adviser.php. Executing manipulation of the argument Name can lead to sql injection. The attack may be performed from remote. The exploit has been published and may be used.

AI-Powered Analysis

AILast updated: 12/09/2025, 19:00:30 UTC

Technical Analysis

CVE-2025-14334 identifies a SQL injection vulnerability in the itsourcecode Student Management System version 1.0, located in the /new_adviser.php script. The vulnerability arises from improper sanitization of the 'Name' parameter, which is directly incorporated into SQL queries without adequate validation or parameterization. This allows an unauthenticated remote attacker to inject malicious SQL code, potentially manipulating the backend database. The attack vector requires no user interaction and no privileges, making it straightforward to exploit remotely over the network. The vulnerability impacts the confidentiality, integrity, and availability of the system by enabling unauthorized data access, modification, or deletion. Although no known exploits are currently active in the wild, the public availability of exploit code increases the likelihood of exploitation attempts. The CVSS 4.0 base score of 6.9 reflects a medium severity, considering the ease of exploitation and the partial impact on the system's security properties. The vulnerability does not require authentication or user interaction, and the scope is limited to the affected version 1.0 of the Student Management System. No official patches have been released yet, emphasizing the need for immediate mitigation steps by administrators.

Potential Impact

For European organizations, especially educational institutions using the itsourcecode Student Management System, this vulnerability poses a significant risk of unauthorized data exposure and manipulation. Attackers exploiting this flaw could access sensitive student and staff information, alter records, or disrupt system availability, potentially leading to data breaches and operational downtime. The impact extends to compliance risks under GDPR due to potential exposure of personal data. The medium severity score indicates a moderate but tangible threat, particularly in environments where the system is integrated with other critical infrastructure. The lack of authentication requirements lowers the barrier for attackers, increasing the risk of widespread exploitation if the system is publicly accessible. The vulnerability could also be leveraged as a foothold for further network intrusion or lateral movement within institutional networks.

Mitigation Recommendations

Organizations should immediately implement input validation and sanitization for the 'Name' parameter in /new_adviser.php, preferably by adopting parameterized queries or prepared statements to prevent SQL injection. Until an official patch is available, administrators should consider deploying Web Application Firewalls (WAFs) with rules to detect and block SQL injection attempts targeting this endpoint. Conduct thorough code reviews and security testing of the Student Management System to identify and remediate similar vulnerabilities. Restrict network access to the application to trusted IP ranges where possible, reducing exposure to remote attacks. Monitor database logs and application logs for unusual queries or error messages indicative of injection attempts. Educate staff about the risks and signs of exploitation, and prepare incident response plans to quickly address potential breaches. Finally, maintain up-to-date backups of critical data to enable recovery in case of data corruption or loss.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-09T13:59:17.226Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69386e50ef540ebbadbb02e0

Added to database: 12/9/2025, 6:45:36 PM

Last enriched: 12/9/2025, 7:00:30 PM

Last updated: 12/11/2025, 5:41:27 AM

Views: 22

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats