Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14566: SQL Injection in kidaze CourseSelectionSystem

0
Medium
VulnerabilityCVE-2025-14566cvecve-2025-14566
Published: Fri Dec 12 2025 (12/12/2025, 15:32:08 UTC)
Source: CVE Database V5
Vendor/Project: kidaze
Product: CourseSelectionSystem

Description

A security flaw has been discovered in kidaze CourseSelectionSystem up to 42cd892b40a18d50bd4ed1905fa89f939173a464. The impacted element is an unknown function of the file /Profilers/SProfile/reg.php. Performing a manipulation of the argument USN results in sql injection. It is possible to initiate the attack remotely. The exploit has been released to the public and may be used for attacks.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 22:56:38 UTC

Technical Analysis

CVE-2025-14566 identifies a SQL injection vulnerability in the kidaze CourseSelectionSystem, specifically in an undisclosed function located in the file /Profilers/SProfile/reg.php. The vulnerability arises from improper sanitization or validation of the USN parameter, which is susceptible to malicious SQL payloads. This flaw allows an unauthenticated remote attacker to execute arbitrary SQL queries against the backend database by manipulating the USN argument. The vulnerability does not require any privileges or user interaction, making it highly accessible for exploitation. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the network attack vector, low complexity, and no need for authentication or user interaction, but with limited impact on confidentiality, integrity, and availability. The scope remains unchanged, indicating the attack affects only the vulnerable component. Although no active exploitation has been reported, the public availability of an exploit increases the likelihood of attacks. The vulnerability could enable attackers to extract sensitive student or course data, alter records, or disrupt service availability, posing significant risks to educational institutions relying on this system. No official patches or mitigation links are provided yet, emphasizing the need for immediate defensive measures.

Potential Impact

The SQL injection vulnerability in kidaze CourseSelectionSystem can have severe consequences for organizations, particularly educational institutions managing course selections and student data. Exploitation can lead to unauthorized disclosure of sensitive information such as student identities, course enrollments, and academic records, violating privacy regulations and damaging institutional reputation. Attackers may also modify or delete data, undermining data integrity and potentially causing operational disruptions. In worst cases, attackers could escalate their access or pivot to other internal systems if database credentials or configurations are exposed. The remote, unauthenticated nature of the vulnerability increases the attack surface and risk, especially in environments exposed to the internet. The availability of a public exploit further elevates the threat, potentially leading to automated or widespread attacks. Organizations failing to address this vulnerability may face data breaches, compliance penalties, and loss of trust from students and stakeholders.

Mitigation Recommendations

Given the absence of official patches, organizations should implement immediate compensating controls. First, apply strict input validation and sanitization on the USN parameter at the application level to block malicious SQL payloads. Employ parameterized queries or prepared statements to prevent direct injection of user input into SQL commands. Restrict database user privileges to the minimum necessary to limit the impact of any successful injection. Implement web application firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the vulnerable endpoint. Monitor logs for unusual query patterns or repeated access to /Profilers/SProfile/reg.php with suspicious USN values. If possible, isolate the vulnerable system from direct internet exposure or restrict access via VPN or IP whitelisting. Stay alert for official patches or updates from kidaze and apply them promptly once available. Conduct regular security assessments and penetration testing to verify the effectiveness of mitigations.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-12T11:07:56.964Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693c45b972d8eb03a613ec58

Added to database: 12/12/2025, 4:41:29 PM

Last enriched: 2/24/2026, 10:56:38 PM

Last updated: 3/24/2026, 12:08:39 AM

Views: 98

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses