Skip to main content

CVE-2025-4935: SQL Injection in SourceCodester Stock Management System

Medium
VulnerabilityCVE-2025-4935cvecve-2025-4935
Published: Mon May 19 2025 (05/19/2025, 14:00:06 UTC)
Source: CVE
Vendor/Project: SourceCodester
Product: Stock Management System

Description

A vulnerability was found in SourceCodester Stock Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /php_action/changePassword.php. The manipulation of the argument user_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/11/2025, 19:16:23 UTC

Technical Analysis

CVE-2025-4935 is a critical SQL Injection vulnerability identified in SourceCodester Stock Management System version 1.0. The vulnerability resides in the /php_action/changePassword.php file, specifically in the processing of the user_id parameter. An attacker can remotely exploit this flaw by manipulating the user_id argument, which is not properly sanitized or parameterized, allowing malicious SQL code to be injected and executed on the backend database. This can lead to unauthorized data access, data modification, or even complete compromise of the database server. The vulnerability does not require any authentication or user interaction, making it highly accessible to remote attackers. The CVSS 4.0 score is 6.9, categorized as medium severity, reflecting the ease of exploitation (network attack vector, no privileges or user interaction required) but with limited impact on confidentiality, integrity, and availability (low to medium impact). Although no public exploits have been reported in the wild yet, the vulnerability has been publicly disclosed, increasing the risk of exploitation. The affected product is a stock management system, which typically manages inventory, supplier, and sales data, making it a valuable target for attackers seeking financial or operational disruption. The lack of available patches or mitigations from the vendor further exacerbates the risk for organizations using this software.

Potential Impact

For European organizations using SourceCodester Stock Management System 1.0, this vulnerability poses a significant risk to the confidentiality and integrity of their inventory and transactional data. Successful exploitation could lead to unauthorized disclosure of sensitive business information, manipulation of stock records, or disruption of supply chain operations. This could result in financial losses, reputational damage, and regulatory compliance issues, especially under GDPR where data breaches must be reported and can incur heavy fines. The remote and unauthenticated nature of the vulnerability increases the likelihood of attacks, potentially allowing cybercriminals or competitors to gain unauthorized access without insider knowledge. Organizations relying on this system for critical stock management functions may face operational downtime or data corruption, impacting business continuity. Given the absence of known exploits in the wild, the immediate threat level may be moderate, but the public disclosure and lack of patches necessitate urgent attention to prevent future exploitation.

Mitigation Recommendations

1. Immediate mitigation should include isolating the affected system from external networks to reduce exposure until a patch or update is available. 2. Implement Web Application Firewall (WAF) rules specifically designed to detect and block SQL injection attempts targeting the user_id parameter in /php_action/changePassword.php. 3. Conduct a thorough code review and apply input validation and parameterized queries to sanitize user inputs, especially for the user_id parameter. 4. If possible, upgrade to a newer, patched version of the SourceCodester Stock Management System or switch to alternative software with active security support. 5. Monitor logs for suspicious database queries or failed login attempts that may indicate exploitation attempts. 6. Employ network segmentation to limit database access only to trusted application servers. 7. Prepare an incident response plan to quickly address any detected exploitation, including data backup and recovery procedures. 8. Engage with the vendor or community to obtain or develop patches and share threat intelligence regarding this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-05-18T12:25:15.983Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682cd0f81484d88663aeb6d8

Added to database: 5/20/2025, 6:59:04 PM

Last enriched: 7/11/2025, 7:16:23 PM

Last updated: 8/11/2025, 9:44:03 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats