CVE-2025-5369: SQL Injection in SourceCodester PHP Display Username After Login
A vulnerability classified as critical has been found in SourceCodester PHP Display Username After Login 1.0. Affected is an unknown function of the file /login.php. The manipulation of the argument Username leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-5369 is a SQL Injection vulnerability identified in SourceCodester PHP Display Username After Login version 1.0. The vulnerability exists in an unspecified function within the /login.php file, where the 'Username' parameter is improperly sanitized or validated, allowing an attacker to inject malicious SQL code. This flaw enables remote exploitation without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/AT:N/PR:N/UI:N). The injection can lead to unauthorized access or manipulation of the backend database, potentially compromising confidentiality, integrity, and availability of the application data. Although the CVSS score is 6.9 (medium severity), the vulnerability's ease of exploitation and lack of required privileges make it a significant risk. No patches or mitigations have been officially released yet, and while no known exploits are currently in the wild, public disclosure of the exploit code increases the likelihood of active attacks. The vulnerability affects only version 1.0 of the product, which is a PHP-based application designed to display the username after login, likely used in small to medium web applications or learning environments.
Potential Impact
For European organizations using SourceCodester PHP Display Username After Login 1.0, this vulnerability poses a risk of unauthorized database access, data leakage, or data manipulation. Attackers could extract sensitive user information, escalate privileges, or disrupt service availability. Given the remote and unauthenticated nature of the exploit, attackers can target exposed web servers directly. Organizations in sectors handling personal data, such as education, small businesses, or local government entities that may use this lightweight PHP application, could face data breaches or compliance violations under GDPR. The medium CVSS score suggests moderate impact, but the critical nature of SQL injection means that if exploited, the consequences could be severe, including reputational damage and financial penalties. The lack of patches means organizations must rely on immediate mitigation strategies to reduce exposure.
Mitigation Recommendations
Since no official patches are available, European organizations should implement the following specific mitigations: 1) Immediately audit all instances of SourceCodester PHP Display Username After Login 1.0 and isolate or take offline any exposed systems until mitigations are applied. 2) Apply input validation and parameterized queries or prepared statements in the /login.php script to sanitize the 'Username' parameter, preventing injection. 3) Employ Web Application Firewalls (WAFs) with rules specifically targeting SQL injection patterns to block malicious payloads targeting this vulnerability. 4) Restrict database user permissions to the minimum necessary to limit the impact of any injection. 5) Monitor web server and database logs for unusual queries or access patterns indicative of exploitation attempts. 6) Consider migrating to alternative, actively maintained authentication modules or frameworks with secure coding practices. 7) Educate development and security teams about secure coding and the risks of SQL injection to prevent similar vulnerabilities in custom code.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-5369: SQL Injection in SourceCodester PHP Display Username After Login
Description
A vulnerability classified as critical has been found in SourceCodester PHP Display Username After Login 1.0. Affected is an unknown function of the file /login.php. The manipulation of the argument Username leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-5369 is a SQL Injection vulnerability identified in SourceCodester PHP Display Username After Login version 1.0. The vulnerability exists in an unspecified function within the /login.php file, where the 'Username' parameter is improperly sanitized or validated, allowing an attacker to inject malicious SQL code. This flaw enables remote exploitation without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/AT:N/PR:N/UI:N). The injection can lead to unauthorized access or manipulation of the backend database, potentially compromising confidentiality, integrity, and availability of the application data. Although the CVSS score is 6.9 (medium severity), the vulnerability's ease of exploitation and lack of required privileges make it a significant risk. No patches or mitigations have been officially released yet, and while no known exploits are currently in the wild, public disclosure of the exploit code increases the likelihood of active attacks. The vulnerability affects only version 1.0 of the product, which is a PHP-based application designed to display the username after login, likely used in small to medium web applications or learning environments.
Potential Impact
For European organizations using SourceCodester PHP Display Username After Login 1.0, this vulnerability poses a risk of unauthorized database access, data leakage, or data manipulation. Attackers could extract sensitive user information, escalate privileges, or disrupt service availability. Given the remote and unauthenticated nature of the exploit, attackers can target exposed web servers directly. Organizations in sectors handling personal data, such as education, small businesses, or local government entities that may use this lightweight PHP application, could face data breaches or compliance violations under GDPR. The medium CVSS score suggests moderate impact, but the critical nature of SQL injection means that if exploited, the consequences could be severe, including reputational damage and financial penalties. The lack of patches means organizations must rely on immediate mitigation strategies to reduce exposure.
Mitigation Recommendations
Since no official patches are available, European organizations should implement the following specific mitigations: 1) Immediately audit all instances of SourceCodester PHP Display Username After Login 1.0 and isolate or take offline any exposed systems until mitigations are applied. 2) Apply input validation and parameterized queries or prepared statements in the /login.php script to sanitize the 'Username' parameter, preventing injection. 3) Employ Web Application Firewalls (WAFs) with rules specifically targeting SQL injection patterns to block malicious payloads targeting this vulnerability. 4) Restrict database user permissions to the minimum necessary to limit the impact of any injection. 5) Monitor web server and database logs for unusual queries or access patterns indicative of exploitation attempts. 6) Consider migrating to alternative, actively maintained authentication modules or frameworks with secure coding practices. 7) Educate development and security teams about secure coding and the risks of SQL injection to prevent similar vulnerabilities in custom code.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-05-30T10:57:01.548Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 683a8feb182aa0cae2d188d6
Added to database: 5/31/2025, 5:13:15 AM
Last enriched: 7/8/2025, 12:58:20 PM
Last updated: 8/14/2025, 8:16:40 PM
Views: 18
Related Threats
CVE-2025-9060: CWE-20 Improper Input Validation in MSoft MFlash
CriticalCVE-2025-8675: CWE-918 Server-Side Request Forgery (SSRF) in Drupal AI SEO Link Advisor
MediumCVE-2025-8362: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Drupal GoogleTag Manager
MediumCVE-2025-8361: CWE-962 Missing Authorization in Drupal Config Pages
HighCVE-2025-8092: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Drupal COOKiES Consent Management
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.