Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14666: SQL Injection in itsourcecode COVID Tracking System

0
Medium
VulnerabilityCVE-2025-14666cvecve-2025-14666
Published: Sun Dec 14 2025 (12/14/2025, 15:32:07 UTC)
Source: CVE Database V5
Vendor/Project: itsourcecode
Product: COVID Tracking System

Description

A weakness has been identified in itsourcecode COVID Tracking System 1.0. The affected element is an unknown function of the file /admin/?page=user. This manipulation of the argument Username causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.

AI-Powered Analysis

AILast updated: 12/21/2025, 17:24:12 UTC

Technical Analysis

The identified vulnerability, CVE-2025-14666, affects the itsourcecode COVID Tracking System version 1.0, specifically an unknown function within the /admin/?page=user endpoint. The vulnerability arises from improper sanitization of the Username parameter, enabling an attacker to perform SQL injection attacks remotely without authentication or user interaction. SQL injection allows attackers to manipulate backend database queries, potentially leading to unauthorized data access, data modification, or deletion, and in some cases, full system compromise. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and partial impacts on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). The vulnerability is publicly disclosed with exploit code available, although no active exploitation in the wild has been reported yet. The lack of patches or official remediation increases the urgency for organizations to implement mitigations. This vulnerability is particularly concerning for COVID tracking systems, which handle sensitive personal health data and are critical for public health operations. Exploitation could lead to exposure of personal health information, manipulation of tracking data, or disruption of COVID response efforts. The vulnerability’s presence in an administrative interface increases the risk, as compromised admin access can lead to broader system control.

Potential Impact

For European organizations, the impact of CVE-2025-14666 can be significant due to the sensitive nature of COVID tracking data, which often includes personally identifiable information (PII) and health status. Unauthorized access or data manipulation could violate GDPR regulations, leading to legal penalties and reputational damage. Disruption of COVID tracking systems could impair public health responses, affecting containment and monitoring efforts. The medium severity rating reflects partial but meaningful impacts on confidentiality, integrity, and availability. Since the vulnerability requires no authentication and no user interaction, it is easier for attackers to exploit remotely, increasing the risk of widespread attacks if the software is widely deployed. Organizations relying on this system for critical pandemic management may face operational disruptions and loss of trust from citizens and stakeholders.

Mitigation Recommendations

To mitigate CVE-2025-14666, organizations should immediately implement input validation and sanitization on the Username parameter and all user-supplied inputs within the affected endpoint. Employing parameterized queries or prepared statements is essential to prevent SQL injection. Restrict access to the /admin interface using network-level controls such as VPNs, IP whitelisting, or multi-factor authentication to reduce exposure. Conduct thorough code reviews and security testing to identify and remediate similar injection flaws. If patches become available from the vendor, apply them promptly. In the absence of official patches, consider deploying Web Application Firewalls (WAFs) with specific rules to detect and block SQL injection attempts targeting this endpoint. Regularly monitor logs for suspicious activity related to the /admin/?page=user endpoint. Additionally, ensure that database accounts used by the application have the least privileges necessary to limit the impact of any successful injection.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-13T13:38:39.944Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693edcf93c5c518da22e3b8f

Added to database: 12/14/2025, 3:51:21 PM

Last enriched: 12/21/2025, 5:24:12 PM

Last updated: 2/6/2026, 1:28:45 AM

Views: 65

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats