Skip to main content

CVE-2025-5649: Improper Access Controls in SourceCodester Student Result Management System

Medium
VulnerabilityCVE-2025-5649cvecve-2025-5649
Published: Thu Jun 05 2025 (06/05/2025, 09:00:17 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: Student Result Management System

Description

A vulnerability classified as critical has been found in SourceCodester Student Result Management System 1.0. This affects an unknown part of the file /admin/core/new_user of the component Register Interface. The manipulation leads to improper access controls. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/07/2025, 03:43:19 UTC

Technical Analysis

CVE-2025-5649 is a vulnerability identified in version 1.0 of the SourceCodester Student Result Management System, specifically within the /admin/core/new_user component of the Register Interface. The flaw is due to improper access controls, allowing unauthorized remote attackers to potentially manipulate the registration process or user creation functionality without authentication or user interaction. The vulnerability is remotely exploitable and does not require privileges, making it accessible to any attacker with network access to the affected system. The CVSS 4.0 base score is 6.9, indicating a medium severity level. The vector indicates network attack vector (AV:N), low attack complexity (AC:L), no authentication required (AT:N), no user interaction (UI:N), no impact on confidentiality (VC:N), low impact on integrity (VI:L), no impact on availability (VA:N), and no scope change (S:U). This suggests that while the vulnerability does not directly compromise confidentiality or availability, it can lead to limited integrity violations, such as unauthorized creation or modification of user accounts or data within the system. The vulnerability has been publicly disclosed, but no known exploits are currently reported in the wild. The lack of available patches or mitigations in the provided data indicates that organizations using this software version remain exposed until a fix is issued or implemented.

Potential Impact

For European organizations, particularly educational institutions or administrative bodies using the SourceCodester Student Result Management System, this vulnerability poses a risk of unauthorized access or manipulation of student records and user accounts. The integrity of student results and administrative data could be compromised, potentially leading to data tampering, unauthorized user creation, or privilege escalation within the system. This could undermine trust in academic records and administrative processes, potentially causing reputational damage and regulatory compliance issues under GDPR if personal data integrity is affected. Although the vulnerability does not directly impact confidentiality or availability, the integrity impact can have significant operational consequences. Furthermore, since the exploit requires no authentication and can be initiated remotely, attackers could leverage this vulnerability to gain footholds in networks, especially if the system is exposed to the internet or poorly segmented internally. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, as public disclosure increases the likelihood of future exploitation attempts.

Mitigation Recommendations

European organizations should immediately assess their deployment of SourceCodester Student Result Management System version 1.0 and restrict access to the /admin/core/new_user interface to trusted internal networks only, using network segmentation and firewall rules. Implement strict access control lists (ACLs) and consider deploying web application firewalls (WAFs) with custom rules to detect and block unauthorized attempts to access the vulnerable endpoint. Monitor logs for unusual activity related to user registration or account creation. Since no official patch is currently available, organizations should consider disabling or restricting the registration interface if possible until a vendor patch is released. Additionally, conduct regular audits of user accounts and permissions to detect unauthorized changes. Educate IT staff on this vulnerability and establish incident response plans to quickly address any exploitation attempts. Finally, maintain up-to-date backups of critical data to enable recovery in case of data integrity compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-06-04T12:32:55.378Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68418437182aa0cae2dccca5

Added to database: 6/5/2025, 11:49:11 AM

Last enriched: 7/7/2025, 3:43:19 AM

Last updated: 7/31/2025, 8:30:43 AM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats