Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-2655: SQL Injection in SourceCodester AC Repair and Services System

0
Medium
VulnerabilityCVE-2025-2655cvecve-2025-2655
Published: Sun Mar 23 2025 (03/23/2025, 16:31:05 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: AC Repair and Services System

Description

A vulnerability was detected in SourceCodester AC Repair and Services System 1.0. The affected element is the function save_users/delete_users of the file /classes/Users.php. Performing manipulation of the argument ID results in sql injection. It is possible to initiate the attack remotely. The exploit is now public and may be used. Other parameters might be affected as well.

AI-Powered Analysis

AILast updated: 11/22/2025, 17:22:16 UTC

Technical Analysis

CVE-2025-2655 identifies a SQL injection vulnerability in SourceCodester AC Repair and Services System version 1.0, specifically in the save_users and delete_users functions located in the /classes/Users.php file. The vulnerability arises from improper sanitization of the ID parameter, allowing an attacker to inject malicious SQL code remotely without requiring authentication or user interaction. This can lead to unauthorized access, modification, or deletion of database records, potentially compromising the confidentiality, integrity, and availability of the system's data. The vulnerability is exploitable over the network (AV:N) with low attack complexity (AC:L) and no privileges or user interaction needed. The impact on confidentiality, integrity, and availability is low to limited (VC:L, VI:L, VA:L), resulting in a CVSS 4.0 base score of 6.9, categorized as medium severity. Although no known exploits are currently active in the wild, the availability of public exploit code increases the risk of exploitation. The vulnerability may also affect other parameters beyond ID, indicating a broader input validation issue. The affected product is niche software used for managing AC repair and services, which may limit the scope but still poses a risk to organizations relying on it for operational management. No official patches or fixes have been linked yet, so mitigation requires manual intervention such as input validation and use of parameterized queries.

Potential Impact

For European organizations using SourceCodester AC Repair and Services System 1.0, this vulnerability could lead to unauthorized access to sensitive customer and operational data, manipulation or deletion of user records, and potential disruption of service management workflows. This may result in data breaches, loss of customer trust, regulatory non-compliance (e.g., GDPR), and operational downtime. Since the exploit can be initiated remotely without authentication, attackers could leverage this vulnerability to gain footholds in internal networks or pivot to other systems. The impact is particularly significant for small to medium enterprises in the HVAC and repair service sectors that rely on this software for customer and service management. Additionally, compromised data integrity could affect billing, scheduling, and service quality, leading to financial and reputational damage.

Mitigation Recommendations

1. Immediately implement input validation and sanitization on all user-supplied parameters, especially the ID parameter in save_users and delete_users functions. 2. Refactor the vulnerable functions to use parameterized queries or prepared statements to prevent SQL injection. 3. Restrict database user permissions to the minimum necessary to limit the impact of any successful injection. 4. Monitor logs for unusual database queries or access patterns indicative of exploitation attempts. 5. If possible, isolate the affected application in a segmented network zone to reduce lateral movement risk. 6. Engage with the vendor or community to obtain or develop official patches or updates. 7. Conduct a thorough code review of other input handling functions to identify and remediate similar vulnerabilities. 8. Educate developers and administrators on secure coding practices and the importance of input validation. 9. Consider deploying Web Application Firewalls (WAF) with rules to detect and block SQL injection attempts targeting this application. 10. Prepare incident response plans specific to potential exploitation scenarios involving this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-03-22T08:26:10.245Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6921edc532b9fb10dcd3d962

Added to database: 11/22/2025, 5:07:17 PM

Last enriched: 11/22/2025, 5:22:16 PM

Last updated: 11/22/2025, 6:09:19 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats