Skip to main content

CVE-2025-4787: SQL Injection in SourceCodester Stock Management System

Medium
VulnerabilityCVE-2025-4787cvecve-2025-4787
Published: Fri May 16 2025 (05/16/2025, 16:00:06 UTC)
Source: CVE
Vendor/Project: SourceCodester
Product: Stock Management System

Description

A vulnerability classified as critical has been found in SourceCodester/oretnom23 Stock Management System 1.0. Affected is an unknown function of the file /admin/?page=sales/view_sale. The manipulation of the argument ID leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/11/2025, 23:05:06 UTC

Technical Analysis

CVE-2025-4787 is a SQL Injection vulnerability identified in version 1.0 of the SourceCodester/oretnom23 Stock Management System. The vulnerability exists in an unspecified function within the file path /admin/?page=sales/view_sale. Specifically, the issue arises from improper sanitization or validation of the 'ID' parameter, which can be manipulated by an attacker to inject malicious SQL code. This injection flaw allows an attacker to craft a specially designed request that is sent remotely without requiring user interaction or authentication, exploiting the system's backend database. The vulnerability has been publicly disclosed, although no known exploits are currently reported in the wild. The CVSS 4.0 base score is 5.3, indicating a medium severity level. The vector string (AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N) shows that the attack is network-based, requires low attack complexity, no user interaction, but requires low privileges (authenticated user). The impact on confidentiality, integrity, and availability is limited but present, as the vulnerability could allow unauthorized reading or modification of data within the database, potentially affecting sales records and stock management information. The lack of a patch link suggests that no official fix has been released yet, increasing the urgency for mitigation through other means.

Potential Impact

For European organizations using the SourceCodester Stock Management System 1.0, this vulnerability poses a risk of unauthorized data access and manipulation within their stock and sales databases. This can lead to financial discrepancies, loss of inventory control, and potential leakage of sensitive business information. Given that the vulnerability requires low privileges but no user interaction, insider threats or compromised low-privilege accounts could be leveraged to exploit this flaw remotely. The medium severity rating suggests moderate risk; however, the critical nature of stock management systems in supply chain and retail sectors means exploitation could disrupt business operations and damage trust with customers and partners. Additionally, organizations subject to GDPR must consider the implications of data breaches resulting from such vulnerabilities, including regulatory fines and reputational damage. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as exploit code is publicly available.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Immediately audit and restrict access to the /admin/?page=sales/view_sale endpoint, ensuring only necessary personnel have low-privilege authenticated access. 2) Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'ID' parameter in the affected URL. 3) Conduct thorough input validation and parameterized query implementation in the source code to sanitize the 'ID' parameter, if source code access and modification are possible. 4) Monitor logs for unusual database query patterns or repeated access attempts to the vulnerable endpoint. 5) Isolate the stock management system within a segmented network zone to limit lateral movement if exploited. 6) Engage with the vendor or community to obtain or develop patches or updates addressing this vulnerability. 7) Prepare incident response plans specific to database compromise scenarios to minimize impact if exploitation occurs. These steps go beyond generic advice by focusing on access control, network segmentation, and proactive detection tailored to this specific vulnerability context.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-05-15T16:01:18.881Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682cd0f91484d88663aebd87

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 7/11/2025, 11:05:06 PM

Last updated: 7/29/2025, 6:02:59 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats