Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14666: SQL Injection in itsourcecode COVID Tracking System

0
Medium
VulnerabilityCVE-2025-14666cvecve-2025-14666
Published: Sun Dec 14 2025 (12/14/2025, 15:32:07 UTC)
Source: CVE Database V5
Vendor/Project: itsourcecode
Product: COVID Tracking System

Description

A weakness has been identified in itsourcecode COVID Tracking System 1.0. The affected element is an unknown function of the file /admin/?page=user. This manipulation of the argument Username causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.

AI-Powered Analysis

AILast updated: 12/14/2025, 15:57:55 UTC

Technical Analysis

CVE-2025-14666 identifies a SQL injection vulnerability in the itsourcecode COVID Tracking System version 1.0. The vulnerability exists in an unspecified function within the /admin/?page=user endpoint, where the Username parameter is improperly sanitized. This allows an attacker to inject malicious SQL code remotely without requiring authentication or user interaction. The vulnerability can lead to unauthorized reading, modification, or deletion of database records, potentially exposing sensitive personal health information or disrupting system operations. The CVSS 4.0 score of 6.9 (medium severity) reflects the network attack vector, low attack complexity, no privileges or user interaction needed, and partial impact on confidentiality, integrity, and availability. Although no active exploits in the wild are currently reported, public availability of exploit code increases the likelihood of attacks. The COVID Tracking System is likely used by health organizations to monitor infection rates and manage public health responses, making the integrity and confidentiality of its data critical. The lack of patches or vendor advisories increases the urgency for organizations to implement mitigations. This vulnerability exemplifies the risks of insufficient input validation in web applications handling sensitive data.

Potential Impact

For European organizations, particularly public health authorities and institutions relying on the itsourcecode COVID Tracking System, this vulnerability poses significant risks. Exploitation could lead to unauthorized disclosure of sensitive personal health data, violating GDPR and other privacy regulations, resulting in legal and reputational damage. Integrity of COVID tracking data could be compromised, leading to inaccurate reporting and potentially flawed public health decisions. Availability impacts could disrupt critical pandemic response operations. The remote, unauthenticated nature of the exploit increases the attack surface, especially if the admin interface is exposed or poorly secured. Given the critical nature of health data and pandemic management, the impact extends beyond IT systems to public safety and trust. Organizations may face regulatory scrutiny and financial penalties if breaches occur. The medium severity rating suggests a moderate but actionable threat that requires prompt attention to prevent escalation.

Mitigation Recommendations

Organizations should immediately audit and restrict access to the /admin/?page=user interface, ideally limiting it to trusted internal networks or VPNs. Implement strict input validation and sanitization on the Username parameter, replacing vulnerable code with parameterized queries or prepared statements to prevent SQL injection. If source code access is available, conduct a thorough code review for similar injection points. Monitor logs for suspicious query patterns or repeated failed attempts targeting the vulnerable endpoint. Deploy web application firewalls (WAFs) with rules to detect and block SQL injection payloads targeting this parameter. Since no official patch is available, consider temporary mitigations such as disabling or restricting the vulnerable functionality until a vendor fix is released. Educate administrators on the risks and signs of exploitation. Regularly back up databases and ensure incident response plans are updated to handle potential data breaches. Coordinate with vendors and security communities for updates or patches.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-13T13:38:39.944Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693edcf93c5c518da22e3b8f

Added to database: 12/14/2025, 3:51:21 PM

Last enriched: 12/14/2025, 3:57:55 PM

Last updated: 12/15/2025, 4:23:11 AM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats