Skip to main content

CVE-2025-5369: SQL Injection in SourceCodester PHP Display Username After Login

Medium
VulnerabilityCVE-2025-5369cvecve-2025-5369
Published: Sat May 31 2025 (05/31/2025, 05:00:08 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: PHP Display Username After Login

Description

A vulnerability classified as critical has been found in SourceCodester PHP Display Username After Login 1.0. Affected is an unknown function of the file /login.php. The manipulation of the argument Username leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/08/2025, 12:58:20 UTC

Technical Analysis

CVE-2025-5369 is a SQL Injection vulnerability identified in SourceCodester PHP Display Username After Login version 1.0. The vulnerability exists in an unspecified function within the /login.php file, where the 'Username' parameter is improperly sanitized or validated, allowing an attacker to inject malicious SQL code. This flaw enables remote exploitation without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/AT:N/PR:N/UI:N). The injection can lead to unauthorized access or manipulation of the backend database, potentially compromising confidentiality, integrity, and availability of the application data. Although the CVSS score is 6.9 (medium severity), the vulnerability's ease of exploitation and lack of required privileges make it a significant risk. No patches or mitigations have been officially released yet, and while no known exploits are currently in the wild, public disclosure of the exploit code increases the likelihood of active attacks. The vulnerability affects only version 1.0 of the product, which is a PHP-based application designed to display the username after login, likely used in small to medium web applications or learning environments.

Potential Impact

For European organizations using SourceCodester PHP Display Username After Login 1.0, this vulnerability poses a risk of unauthorized database access, data leakage, or data manipulation. Attackers could extract sensitive user information, escalate privileges, or disrupt service availability. Given the remote and unauthenticated nature of the exploit, attackers can target exposed web servers directly. Organizations in sectors handling personal data, such as education, small businesses, or local government entities that may use this lightweight PHP application, could face data breaches or compliance violations under GDPR. The medium CVSS score suggests moderate impact, but the critical nature of SQL injection means that if exploited, the consequences could be severe, including reputational damage and financial penalties. The lack of patches means organizations must rely on immediate mitigation strategies to reduce exposure.

Mitigation Recommendations

Since no official patches are available, European organizations should implement the following specific mitigations: 1) Immediately audit all instances of SourceCodester PHP Display Username After Login 1.0 and isolate or take offline any exposed systems until mitigations are applied. 2) Apply input validation and parameterized queries or prepared statements in the /login.php script to sanitize the 'Username' parameter, preventing injection. 3) Employ Web Application Firewalls (WAFs) with rules specifically targeting SQL injection patterns to block malicious payloads targeting this vulnerability. 4) Restrict database user permissions to the minimum necessary to limit the impact of any injection. 5) Monitor web server and database logs for unusual queries or access patterns indicative of exploitation attempts. 6) Consider migrating to alternative, actively maintained authentication modules or frameworks with secure coding practices. 7) Educate development and security teams about secure coding and the risks of SQL injection to prevent similar vulnerabilities in custom code.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-05-30T10:57:01.548Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 683a8feb182aa0cae2d188d6

Added to database: 5/31/2025, 5:13:15 AM

Last enriched: 7/8/2025, 12:58:20 PM

Last updated: 8/14/2025, 8:16:40 PM

Views: 18

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats