CVE-2025-14566: SQL Injection in kidaze CourseSelectionSystem
A security flaw has been discovered in kidaze CourseSelectionSystem up to 42cd892b40a18d50bd4ed1905fa89f939173a464. The impacted element is an unknown function of the file /Profilers/SProfile/reg.php. Performing a manipulation of the argument USN results in sql injection. It is possible to initiate the attack remotely. The exploit has been released to the public and may be used for attacks.
AI Analysis
Technical Summary
CVE-2025-14566 identifies a SQL injection vulnerability in the kidaze CourseSelectionSystem, specifically in an undisclosed function located in the file /Profilers/SProfile/reg.php. The vulnerability arises from improper sanitization or validation of the USN parameter, which is susceptible to malicious SQL payloads. This flaw allows an unauthenticated remote attacker to execute arbitrary SQL queries against the backend database by manipulating the USN argument. The vulnerability does not require any privileges or user interaction, making it highly accessible for exploitation. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the network attack vector, low complexity, and no need for authentication or user interaction, but with limited impact on confidentiality, integrity, and availability. The scope remains unchanged, indicating the attack affects only the vulnerable component. Although no active exploitation has been reported, the public availability of an exploit increases the likelihood of attacks. The vulnerability could enable attackers to extract sensitive student or course data, alter records, or disrupt service availability, posing significant risks to educational institutions relying on this system. No official patches or mitigation links are provided yet, emphasizing the need for immediate defensive measures.
Potential Impact
The SQL injection vulnerability in kidaze CourseSelectionSystem can have severe consequences for organizations, particularly educational institutions managing course selections and student data. Exploitation can lead to unauthorized disclosure of sensitive information such as student identities, course enrollments, and academic records, violating privacy regulations and damaging institutional reputation. Attackers may also modify or delete data, undermining data integrity and potentially causing operational disruptions. In worst cases, attackers could escalate their access or pivot to other internal systems if database credentials or configurations are exposed. The remote, unauthenticated nature of the vulnerability increases the attack surface and risk, especially in environments exposed to the internet. The availability of a public exploit further elevates the threat, potentially leading to automated or widespread attacks. Organizations failing to address this vulnerability may face data breaches, compliance penalties, and loss of trust from students and stakeholders.
Mitigation Recommendations
Given the absence of official patches, organizations should implement immediate compensating controls. First, apply strict input validation and sanitization on the USN parameter at the application level to block malicious SQL payloads. Employ parameterized queries or prepared statements to prevent direct injection of user input into SQL commands. Restrict database user privileges to the minimum necessary to limit the impact of any successful injection. Implement web application firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the vulnerable endpoint. Monitor logs for unusual query patterns or repeated access to /Profilers/SProfile/reg.php with suspicious USN values. If possible, isolate the vulnerable system from direct internet exposure or restrict access via VPN or IP whitelisting. Stay alert for official patches or updates from kidaze and apply them promptly once available. Conduct regular security assessments and penetration testing to verify the effectiveness of mitigations.
Affected Countries
United States, India, China, United Kingdom, Canada, Australia, Germany, France, Brazil, South Korea
CVE-2025-14566: SQL Injection in kidaze CourseSelectionSystem
Description
A security flaw has been discovered in kidaze CourseSelectionSystem up to 42cd892b40a18d50bd4ed1905fa89f939173a464. The impacted element is an unknown function of the file /Profilers/SProfile/reg.php. Performing a manipulation of the argument USN results in sql injection. It is possible to initiate the attack remotely. The exploit has been released to the public and may be used for attacks.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-14566 identifies a SQL injection vulnerability in the kidaze CourseSelectionSystem, specifically in an undisclosed function located in the file /Profilers/SProfile/reg.php. The vulnerability arises from improper sanitization or validation of the USN parameter, which is susceptible to malicious SQL payloads. This flaw allows an unauthenticated remote attacker to execute arbitrary SQL queries against the backend database by manipulating the USN argument. The vulnerability does not require any privileges or user interaction, making it highly accessible for exploitation. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the network attack vector, low complexity, and no need for authentication or user interaction, but with limited impact on confidentiality, integrity, and availability. The scope remains unchanged, indicating the attack affects only the vulnerable component. Although no active exploitation has been reported, the public availability of an exploit increases the likelihood of attacks. The vulnerability could enable attackers to extract sensitive student or course data, alter records, or disrupt service availability, posing significant risks to educational institutions relying on this system. No official patches or mitigation links are provided yet, emphasizing the need for immediate defensive measures.
Potential Impact
The SQL injection vulnerability in kidaze CourseSelectionSystem can have severe consequences for organizations, particularly educational institutions managing course selections and student data. Exploitation can lead to unauthorized disclosure of sensitive information such as student identities, course enrollments, and academic records, violating privacy regulations and damaging institutional reputation. Attackers may also modify or delete data, undermining data integrity and potentially causing operational disruptions. In worst cases, attackers could escalate their access or pivot to other internal systems if database credentials or configurations are exposed. The remote, unauthenticated nature of the vulnerability increases the attack surface and risk, especially in environments exposed to the internet. The availability of a public exploit further elevates the threat, potentially leading to automated or widespread attacks. Organizations failing to address this vulnerability may face data breaches, compliance penalties, and loss of trust from students and stakeholders.
Mitigation Recommendations
Given the absence of official patches, organizations should implement immediate compensating controls. First, apply strict input validation and sanitization on the USN parameter at the application level to block malicious SQL payloads. Employ parameterized queries or prepared statements to prevent direct injection of user input into SQL commands. Restrict database user privileges to the minimum necessary to limit the impact of any successful injection. Implement web application firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the vulnerable endpoint. Monitor logs for unusual query patterns or repeated access to /Profilers/SProfile/reg.php with suspicious USN values. If possible, isolate the vulnerable system from direct internet exposure or restrict access via VPN or IP whitelisting. Stay alert for official patches or updates from kidaze and apply them promptly once available. Conduct regular security assessments and penetration testing to verify the effectiveness of mitigations.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-12T11:07:56.964Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 693c45b972d8eb03a613ec58
Added to database: 12/12/2025, 4:41:29 PM
Last enriched: 2/24/2026, 10:56:38 PM
Last updated: 3/24/2026, 12:08:39 AM
Views: 98
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.