Skip to main content

CVE-2025-4504: SQL Injection in SourceCodester Online College Library System

Medium
VulnerabilityCVE-2025-4504cvecve-2025-4504
Published: Sat May 10 2025 (05/10/2025, 14:31:05 UTC)
Source: CVE
Vendor/Project: SourceCodester
Product: Online College Library System

Description

A vulnerability was found in SourceCodester Online College Library System 1.0. It has been classified as critical. Affected is an unknown function of the file /index.php. The manipulation of the argument Category leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/12/2025, 03:33:16 UTC

Technical Analysis

CVE-2025-4504 is a critical SQL Injection vulnerability identified in version 1.0 of the SourceCodester Online College Library System. The vulnerability exists in an unspecified function within the /index.php file, where the 'Category' parameter is improperly sanitized, allowing an attacker to inject malicious SQL code. This injection flaw can be exploited remotely without any authentication or user interaction, making it highly accessible to attackers. The SQL Injection can lead to unauthorized access to the backend database, enabling attackers to read, modify, or delete sensitive data stored within the library system. Given that the exploit has been publicly disclosed, the risk of exploitation is elevated, although no confirmed active exploitation in the wild has been reported yet. The CVSS 4.0 score of 6.9 (medium severity) reflects the vulnerability's potential impact on confidentiality, integrity, and availability, with low attack complexity and no privileges or user interaction required. The vulnerability affects only version 1.0 of the product, which is a web-based application typically deployed by educational institutions to manage library resources and user data.

Potential Impact

For European organizations, particularly educational institutions and libraries using the SourceCodester Online College Library System version 1.0, this vulnerability poses a significant risk. Exploitation could lead to unauthorized disclosure of sensitive student and faculty information, manipulation or deletion of library records, and potential disruption of library services. Such data breaches could violate GDPR regulations, leading to legal and financial penalties. The integrity of academic records and resource availability could be compromised, affecting institutional reputation and operational continuity. Additionally, attackers could leverage the compromised system as a foothold for further network intrusion or lateral movement within the organization's infrastructure.

Mitigation Recommendations

Organizations should immediately assess their deployment of the SourceCodester Online College Library System and identify if version 1.0 is in use. Since no official patch links are currently available, administrators should implement the following specific mitigations: 1) Apply input validation and parameterized queries or prepared statements to sanitize the 'Category' parameter and any other user inputs to prevent SQL injection. 2) Employ Web Application Firewalls (WAFs) configured to detect and block SQL injection patterns targeting the vulnerable parameter. 3) Restrict database user permissions to the minimum necessary to limit potential damage from injection attacks. 4) Monitor web server and database logs for suspicious query patterns indicative of SQL injection attempts. 5) Consider isolating the affected system from critical network segments until a patch or update is available. 6) Engage with the vendor or community to obtain or develop a security update addressing this vulnerability. 7) Educate IT staff and users about the risks and signs of exploitation to enable early detection and response.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-05-09T12:54:04.887Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682d9816c4522896dcbd6ae6

Added to database: 5/21/2025, 9:08:38 AM

Last enriched: 7/12/2025, 3:33:16 AM

Last updated: 8/17/2025, 2:52:32 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats