Skip to main content

CVE-2025-46190: n/a in n/a

Critical
VulnerabilityCVE-2025-46190cvecve-2025-46190
Published: Fri May 09 2025 (05/09/2025, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

SourceCodester Client Database Management System 1.0 is vulnerable to SQL Injection in user_delivery_update.php via the order_id POST parameter.

AI-Powered Analysis

AILast updated: 07/04/2025, 23:26:10 UTC

Technical Analysis

CVE-2025-46190 is a critical SQL Injection vulnerability identified in SourceCodester Client Database Management System version 1.0. The vulnerability exists in the user_delivery_update.php script, specifically via the order_id parameter submitted through a POST request. SQL Injection (CWE-89) vulnerabilities allow an attacker to manipulate backend SQL queries by injecting malicious input, potentially leading to unauthorized data access, data modification, or even full system compromise. This particular vulnerability has a CVSS 3.1 base score of 9.8, indicating critical severity. The vector metrics indicate that the attack can be performed remotely over the network (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and affects confidentiality, integrity, and availability (C:H/I:H/A:H). The scope remains unchanged (S:U), meaning the impact is confined to the vulnerable component. Although no known exploits are currently reported in the wild, the ease of exploitation combined with the critical impact makes this a significant threat. The lack of vendor or product details beyond the SourceCodester Client Database Management System 1.0 limits precise identification, but the vulnerability is clearly in a web application context where order_id is processed without proper input sanitization or parameterized queries, allowing attackers to execute arbitrary SQL commands on the backend database.

Potential Impact

For European organizations using the SourceCodester Client Database Management System 1.0, this vulnerability poses a severe risk. Exploitation could lead to unauthorized disclosure of sensitive customer and business data, manipulation or deletion of order records, and disruption of delivery operations. This could result in financial losses, reputational damage, and regulatory non-compliance, especially under GDPR which mandates strict data protection controls. The ability to execute arbitrary SQL commands remotely without authentication increases the attack surface and risk of automated exploitation by threat actors. Organizations relying on this system for client or order management could face operational downtime and data integrity issues, impacting supply chain and customer satisfaction. Additionally, attackers could leverage this vulnerability as a foothold to pivot into internal networks, escalating the threat beyond the initial application.

Mitigation Recommendations

Given the critical nature of CVE-2025-46190, immediate mitigation steps should include: 1) Applying vendor patches or updates if available; since no patch links are provided, organizations should contact the vendor or review official advisories for fixes. 2) Implementing input validation and sanitization on the order_id parameter, ensuring use of parameterized queries or prepared statements to prevent SQL Injection. 3) Employing Web Application Firewalls (WAFs) with rules specifically targeting SQL Injection patterns on the affected endpoint to block malicious payloads. 4) Conducting thorough code reviews and security testing on all user input handling components to identify and remediate similar injection flaws. 5) Monitoring logs for suspicious activities related to order_id parameter usage and unusual database queries. 6) Restricting database user permissions to the minimum necessary to limit damage if exploitation occurs. 7) Considering temporary disabling or restricting access to the vulnerable functionality until a patch is applied. These steps should be integrated into a broader secure development lifecycle and incident response plan.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-04-22T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9817c4522896dcbd72d2

Added to database: 5/21/2025, 9:08:39 AM

Last enriched: 7/4/2025, 11:26:10 PM

Last updated: 7/31/2025, 4:17:14 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats