Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14667: SQL Injection in itsourcecode COVID Tracking System

0
Medium
VulnerabilityCVE-2025-14667cvecve-2025-14667
Published: Sun Dec 14 2025 (12/14/2025, 16:02:06 UTC)
Source: CVE Database V5
Vendor/Project: itsourcecode
Product: COVID Tracking System

Description

A security vulnerability has been detected in itsourcecode COVID Tracking System 1.0. The impacted element is an unknown function of the file /admin/?page=system_info. Such manipulation of the argument meta_value leads to sql injection. The attack may be performed from remote. The exploit has been disclosed publicly and may be used.

AI-Powered Analysis

AILast updated: 12/14/2025, 16:27:27 UTC

Technical Analysis

CVE-2025-14667 identifies a SQL injection vulnerability in the itsourcecode COVID Tracking System version 1.0. The vulnerability resides in an unspecified function within the /admin/?page=system_info endpoint, where the meta_value parameter is improperly sanitized, allowing attackers to inject malicious SQL commands. This injection flaw can be exploited remotely without authentication or user interaction, enabling attackers to manipulate backend database queries. Potential consequences include unauthorized data disclosure, data modification, or even deletion, depending on the database privileges of the application. The vulnerability has been publicly disclosed, increasing the risk of exploitation, although no active exploits have been reported to date. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and partial impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). The absence of patches or vendor advisories necessitates immediate defensive measures by users of the affected software. This vulnerability is particularly concerning for COVID tracking systems as they handle sensitive health data, making confidentiality breaches especially damaging.

Potential Impact

For European organizations, exploitation of this SQL injection vulnerability could lead to unauthorized access to sensitive health data collected by COVID tracking systems, potentially violating GDPR and other privacy regulations. Data integrity could be compromised, undermining the reliability of pandemic-related reporting and decision-making. Availability impacts, while limited, could disrupt system operations if attackers manipulate or delete critical data. The remote and unauthenticated nature of the exploit increases the risk of widespread attacks, especially in healthcare or government sectors relying on this software. The public disclosure heightens the urgency to address the vulnerability to prevent data breaches, reputational damage, and regulatory penalties. Organizations involved in public health monitoring or pandemic response in Europe are particularly vulnerable due to the critical nature of the data and the potential for targeted attacks.

Mitigation Recommendations

Given the lack of official patches, European organizations should immediately implement input validation and sanitization on the meta_value parameter to prevent SQL injection. Employing parameterized queries or prepared statements within the application code is critical to eliminate injection vectors. Restrict access to the /admin/?page=system_info endpoint through network segmentation, VPNs, or IP whitelisting to limit exposure. Conduct thorough code reviews and penetration testing focused on SQL injection vulnerabilities in all user inputs. Monitor logs for suspicious database query patterns indicative of injection attempts. If possible, isolate the COVID Tracking System from the internet or untrusted networks until a patch is available. Engage with the vendor for updates or patches and consider alternative software solutions if remediation is delayed. Additionally, ensure robust database user permissions to minimize the impact of any successful injection.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-13T13:38:43.103Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693ee1f85a3f956d14aa0f9e

Added to database: 12/14/2025, 4:12:40 PM

Last enriched: 12/14/2025, 4:27:27 PM

Last updated: 12/15/2025, 4:14:38 AM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats