CVE-2025-14566: SQL Injection in kidaze CourseSelectionSystem
A security flaw has been discovered in kidaze CourseSelectionSystem up to 42cd892b40a18d50bd4ed1905fa89f939173a464. The impacted element is an unknown function of the file /Profilers/SProfile/reg.php. Performing manipulation of the argument USN results in sql injection. It is possible to initiate the attack remotely. The exploit has been released to the public and may be exploited.
AI Analysis
Technical Summary
CVE-2025-14566 identifies a SQL injection vulnerability in the kidaze CourseSelectionSystem, a software solution used for managing course selections, likely in educational environments. The vulnerability resides in an unspecified function within the /Profilers/SProfile/reg.php file, where the USN parameter is improperly sanitized, allowing attackers to inject malicious SQL code. This flaw can be exploited remotely without authentication or user interaction, making it highly accessible to attackers. The injection can lead to unauthorized data access, modification, or deletion, compromising the confidentiality, integrity, and availability of the backend database. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and partial impacts on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). The vulnerability affects the specific version 42cd892b40a18d50bd4ed1905fa89f939173a464 of the kidaze CourseSelectionSystem. Although no confirmed exploits are currently active in the wild, the public release of exploit code increases the risk of imminent attacks. No official patches or updates have been linked yet, which raises urgency for mitigation. The vulnerability is critical for organizations relying on this system for course management, as attackers could extract sensitive student or institutional data or disrupt service availability.
Potential Impact
For European organizations, particularly educational institutions and universities using the kidaze CourseSelectionSystem, this vulnerability could lead to significant data breaches involving student records, course enrollments, and personal information. The unauthorized access or alteration of such data can result in privacy violations under GDPR, legal liabilities, and reputational damage. Additionally, attackers could disrupt course selection processes, impacting academic operations and causing administrative delays. Since the vulnerability requires no authentication and can be exploited remotely, the attack surface is broad, increasing the likelihood of exploitation. The medium severity rating reflects the partial but meaningful impact on confidentiality, integrity, and availability. The lack of patches means organizations must act quickly to prevent exploitation, especially as exploit code is publicly available. The threat is particularly relevant in countries with widespread adoption of kidaze products in their educational sector, where attackers may target institutions for espionage, data theft, or disruption.
Mitigation Recommendations
Given the absence of official patches, European organizations should immediately implement compensating controls. First, apply strict input validation and sanitization on the USN parameter and any other user-supplied inputs to prevent injection. Employ parameterized queries or prepared statements in the application code to eliminate direct SQL concatenation. Conduct thorough code reviews focusing on database interaction points. Deploy Web Application Firewalls (WAFs) configured to detect and block SQL injection patterns targeting the vulnerable endpoint. Monitor logs for unusual database queries or failed injection attempts to identify potential exploitation attempts early. Restrict database user permissions to the minimum necessary to limit damage if exploited. Engage with the vendor for timely patch releases and apply updates as soon as they become available. Additionally, conduct security awareness training for developers and administrators about secure coding practices and vulnerability management. Consider network segmentation to isolate the CourseSelectionSystem from critical infrastructure where feasible.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Belgium
CVE-2025-14566: SQL Injection in kidaze CourseSelectionSystem
Description
A security flaw has been discovered in kidaze CourseSelectionSystem up to 42cd892b40a18d50bd4ed1905fa89f939173a464. The impacted element is an unknown function of the file /Profilers/SProfile/reg.php. Performing manipulation of the argument USN results in sql injection. It is possible to initiate the attack remotely. The exploit has been released to the public and may be exploited.
AI-Powered Analysis
Technical Analysis
CVE-2025-14566 identifies a SQL injection vulnerability in the kidaze CourseSelectionSystem, a software solution used for managing course selections, likely in educational environments. The vulnerability resides in an unspecified function within the /Profilers/SProfile/reg.php file, where the USN parameter is improperly sanitized, allowing attackers to inject malicious SQL code. This flaw can be exploited remotely without authentication or user interaction, making it highly accessible to attackers. The injection can lead to unauthorized data access, modification, or deletion, compromising the confidentiality, integrity, and availability of the backend database. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and partial impacts on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). The vulnerability affects the specific version 42cd892b40a18d50bd4ed1905fa89f939173a464 of the kidaze CourseSelectionSystem. Although no confirmed exploits are currently active in the wild, the public release of exploit code increases the risk of imminent attacks. No official patches or updates have been linked yet, which raises urgency for mitigation. The vulnerability is critical for organizations relying on this system for course management, as attackers could extract sensitive student or institutional data or disrupt service availability.
Potential Impact
For European organizations, particularly educational institutions and universities using the kidaze CourseSelectionSystem, this vulnerability could lead to significant data breaches involving student records, course enrollments, and personal information. The unauthorized access or alteration of such data can result in privacy violations under GDPR, legal liabilities, and reputational damage. Additionally, attackers could disrupt course selection processes, impacting academic operations and causing administrative delays. Since the vulnerability requires no authentication and can be exploited remotely, the attack surface is broad, increasing the likelihood of exploitation. The medium severity rating reflects the partial but meaningful impact on confidentiality, integrity, and availability. The lack of patches means organizations must act quickly to prevent exploitation, especially as exploit code is publicly available. The threat is particularly relevant in countries with widespread adoption of kidaze products in their educational sector, where attackers may target institutions for espionage, data theft, or disruption.
Mitigation Recommendations
Given the absence of official patches, European organizations should immediately implement compensating controls. First, apply strict input validation and sanitization on the USN parameter and any other user-supplied inputs to prevent injection. Employ parameterized queries or prepared statements in the application code to eliminate direct SQL concatenation. Conduct thorough code reviews focusing on database interaction points. Deploy Web Application Firewalls (WAFs) configured to detect and block SQL injection patterns targeting the vulnerable endpoint. Monitor logs for unusual database queries or failed injection attempts to identify potential exploitation attempts early. Restrict database user permissions to the minimum necessary to limit damage if exploited. Engage with the vendor for timely patch releases and apply updates as soon as they become available. Additionally, conduct security awareness training for developers and administrators about secure coding practices and vulnerability management. Consider network segmentation to isolate the CourseSelectionSystem from critical infrastructure where feasible.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-12T11:07:56.964Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 693c45b972d8eb03a613ec58
Added to database: 12/12/2025, 4:41:29 PM
Last enriched: 12/19/2025, 5:03:17 PM
Last updated: 2/4/2026, 7:06:03 PM
Views: 66
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0536: CWE-787 Out-of-bounds Write in Autodesk 3ds Max
HighCVE-2024-42642: n/a
CriticalCVE-2026-25532: CWE-191: Integer Underflow (Wrap or Wraparound) in espressif esp-idf
MediumCVE-2026-25508: CWE-125: Out-of-bounds Read in espressif esp-idf
MediumCVE-2026-25507: CWE-416: Use After Free in espressif esp-idf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.