CVE-2025-14565: SQL Injection in kidaze CourseSelectionSystem
A vulnerability was identified in kidaze CourseSelectionSystem up to 42cd892b40a18d50bd4ed1905fa89f939173a464. The affected element is an unknown function of the file /Profilers/SProfile/login1.php. Such manipulation of the argument Username leads to sql injection. The attack may be performed from remote. The exploit is publicly available and might be used.
AI Analysis
Technical Summary
CVE-2025-14565 identifies a SQL injection vulnerability in the kidaze CourseSelectionSystem, a software product used for managing course selections, likely in educational environments. The vulnerability resides in an unspecified function within the /Profilers/SProfile/login1.php file, where the Username parameter is improperly sanitized. This lack of input validation allows an attacker to inject malicious SQL code remotely without requiring authentication or user interaction. Exploiting this flaw could enable attackers to execute arbitrary SQL commands on the backend database, potentially leading to unauthorized data disclosure, data manipulation, or even full system compromise depending on database privileges. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P) highlights that the attack is network-based, requires low attack complexity, no privileges, and no user interaction, with low to limited impact on confidentiality, integrity, and availability. The vulnerability is publicly known since December 2025, and although no active exploitation in the wild has been reported, the availability of a public exploit increases the risk of future attacks. No official patches or fixes have been linked, indicating that affected organizations must implement mitigations proactively. The vulnerability's presence in a course selection system suggests a focus on educational institutions, which often hold sensitive student data and operational information, making this a significant concern for data privacy and operational continuity.
Potential Impact
For European organizations, particularly educational institutions using the kidaze CourseSelectionSystem, this vulnerability poses a risk of unauthorized access to sensitive student and staff data, including personal information and academic records. Exploitation could lead to data breaches, reputational damage, and potential regulatory penalties under GDPR due to exposure of personal data. Additionally, attackers could alter course selection data, disrupting academic operations and causing administrative chaos. The remote and unauthenticated nature of the exploit increases the likelihood of attacks, especially if the system is exposed to the internet. The availability of a public exploit further elevates the threat level, potentially attracting opportunistic attackers and cybercriminal groups. While no active exploitation is reported, the medium severity rating suggests that the impact, though not critical, is significant enough to warrant immediate attention to prevent escalation or chaining with other vulnerabilities.
Mitigation Recommendations
Given the absence of an official patch, European organizations should implement the following specific mitigations: 1) Immediately audit and sanitize all user inputs, especially the Username parameter in the /Profilers/SProfile/login1.php file, using parameterized queries or prepared statements to prevent SQL injection. 2) Employ Web Application Firewalls (WAFs) configured to detect and block SQL injection patterns targeting this specific endpoint. 3) Restrict network access to the CourseSelectionSystem backend, limiting exposure to trusted internal networks or VPNs. 4) Conduct thorough code reviews and penetration testing focused on input validation and injection flaws within the application. 5) Monitor logs and network traffic for unusual queries or access patterns indicative of exploitation attempts. 6) Educate IT staff and administrators about this vulnerability and the importance of rapid response. 7) Plan for an emergency patch deployment once the vendor releases an official fix. 8) Consider isolating or segmenting the affected system to minimize lateral movement in case of compromise.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Poland
CVE-2025-14565: SQL Injection in kidaze CourseSelectionSystem
Description
A vulnerability was identified in kidaze CourseSelectionSystem up to 42cd892b40a18d50bd4ed1905fa89f939173a464. The affected element is an unknown function of the file /Profilers/SProfile/login1.php. Such manipulation of the argument Username leads to sql injection. The attack may be performed from remote. The exploit is publicly available and might be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-14565 identifies a SQL injection vulnerability in the kidaze CourseSelectionSystem, a software product used for managing course selections, likely in educational environments. The vulnerability resides in an unspecified function within the /Profilers/SProfile/login1.php file, where the Username parameter is improperly sanitized. This lack of input validation allows an attacker to inject malicious SQL code remotely without requiring authentication or user interaction. Exploiting this flaw could enable attackers to execute arbitrary SQL commands on the backend database, potentially leading to unauthorized data disclosure, data manipulation, or even full system compromise depending on database privileges. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P) highlights that the attack is network-based, requires low attack complexity, no privileges, and no user interaction, with low to limited impact on confidentiality, integrity, and availability. The vulnerability is publicly known since December 2025, and although no active exploitation in the wild has been reported, the availability of a public exploit increases the risk of future attacks. No official patches or fixes have been linked, indicating that affected organizations must implement mitigations proactively. The vulnerability's presence in a course selection system suggests a focus on educational institutions, which often hold sensitive student data and operational information, making this a significant concern for data privacy and operational continuity.
Potential Impact
For European organizations, particularly educational institutions using the kidaze CourseSelectionSystem, this vulnerability poses a risk of unauthorized access to sensitive student and staff data, including personal information and academic records. Exploitation could lead to data breaches, reputational damage, and potential regulatory penalties under GDPR due to exposure of personal data. Additionally, attackers could alter course selection data, disrupting academic operations and causing administrative chaos. The remote and unauthenticated nature of the exploit increases the likelihood of attacks, especially if the system is exposed to the internet. The availability of a public exploit further elevates the threat level, potentially attracting opportunistic attackers and cybercriminal groups. While no active exploitation is reported, the medium severity rating suggests that the impact, though not critical, is significant enough to warrant immediate attention to prevent escalation or chaining with other vulnerabilities.
Mitigation Recommendations
Given the absence of an official patch, European organizations should implement the following specific mitigations: 1) Immediately audit and sanitize all user inputs, especially the Username parameter in the /Profilers/SProfile/login1.php file, using parameterized queries or prepared statements to prevent SQL injection. 2) Employ Web Application Firewalls (WAFs) configured to detect and block SQL injection patterns targeting this specific endpoint. 3) Restrict network access to the CourseSelectionSystem backend, limiting exposure to trusted internal networks or VPNs. 4) Conduct thorough code reviews and penetration testing focused on input validation and injection flaws within the application. 5) Monitor logs and network traffic for unusual queries or access patterns indicative of exploitation attempts. 6) Educate IT staff and administrators about this vulnerability and the importance of rapid response. 7) Plan for an emergency patch deployment once the vendor releases an official fix. 8) Consider isolating or segmenting the affected system to minimize lateral movement in case of compromise.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-12T11:07:53.015Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 693c45b972d8eb03a613ec52
Added to database: 12/12/2025, 4:41:29 PM
Last enriched: 12/19/2025, 5:38:44 PM
Last updated: 2/6/2026, 7:58:34 PM
Views: 68
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2064: Cross Site Scripting in Portabilis i-Educar
MediumCVE-2026-25727: CWE-121: Stack-based Buffer Overflow in time-rs time
MediumCVE-2026-25643: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in blakeblackshear frigate
CriticalCVE-2026-1709: Key Exchange without Entity Authentication in Red Hat Red Hat Enterprise Linux 10
CriticalCVE-2025-15320: Multiple Binds to the Same Port in Tanium Tanium Client
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.