CVE-2025-6346: SQL Injection in SourceCodester Advance Charity Management System
A vulnerability was found in SourceCodester Advance Charity Management System 1.0. It has been classified as critical. This affects an unknown part of the file /members/fundDetails.php. The manipulation of the argument m06 leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-6346 is a SQL Injection vulnerability identified in version 1.0 of the SourceCodester Advance Charity Management System, specifically within the /members/fundDetails.php file. The vulnerability arises from improper sanitization or validation of the 'm06' parameter, which allows an attacker to inject malicious SQL code remotely without requiring user interaction or authentication. This flaw enables an attacker to manipulate backend database queries, potentially leading to unauthorized data access, data modification, or even complete compromise of the database integrity. The vulnerability has been publicly disclosed, increasing the risk of exploitation, although no known exploits have been observed in the wild to date. The CVSS 4.0 base score is 5.3 (medium severity), reflecting network attack vector, low attack complexity, no privileges or user interaction required, but limited impact on confidentiality, integrity, and availability. The vulnerability affects a niche product used primarily by charitable organizations for managing donations and related activities, which may contain sensitive donor and financial information. Given the critical nature of data handled by charity management systems, exploitation could lead to significant data breaches or financial fraud if leveraged effectively.
Potential Impact
For European organizations, particularly charities and non-profits using the Advance Charity Management System, this vulnerability poses a risk of unauthorized access to sensitive donor information, financial records, and internal management data. Exploitation could result in data breaches compromising personal data protected under GDPR, leading to regulatory penalties and reputational damage. Additionally, attackers could manipulate donation records or financial transactions, potentially causing financial loss or fraud. The medium CVSS score suggests limited direct impact on system availability, but the integrity and confidentiality of critical data are at risk. Since the vulnerability can be exploited remotely without authentication, attackers could launch automated attacks at scale, increasing the threat to organizations with internet-facing instances of the affected software. The lack of patches or official fixes further exacerbates the risk, requiring organizations to implement compensating controls promptly.
Mitigation Recommendations
Given the absence of official patches, European organizations should immediately implement the following mitigations: 1) Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the 'm06' parameter in /members/fundDetails.php. 2) Conduct thorough input validation and sanitization on all user-supplied inputs, especially parameters used in SQL queries, ideally using parameterized queries or prepared statements if source code access is available. 3) Restrict database user permissions to the minimum necessary, preventing the application from performing destructive operations even if SQL injection occurs. 4) Monitor application logs and database query logs for anomalous or unexpected queries indicative of injection attempts. 5) Isolate the affected application in a segmented network zone to limit lateral movement in case of compromise. 6) Engage with SourceCodester or community forums to track any forthcoming patches or updates. 7) Consider migrating to alternative charity management solutions with better security track records if remediation is not feasible in the short term.
Affected Countries
United Kingdom, Germany, France, Netherlands, Sweden, Belgium, Italy
CVE-2025-6346: SQL Injection in SourceCodester Advance Charity Management System
Description
A vulnerability was found in SourceCodester Advance Charity Management System 1.0. It has been classified as critical. This affects an unknown part of the file /members/fundDetails.php. The manipulation of the argument m06 leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-6346 is a SQL Injection vulnerability identified in version 1.0 of the SourceCodester Advance Charity Management System, specifically within the /members/fundDetails.php file. The vulnerability arises from improper sanitization or validation of the 'm06' parameter, which allows an attacker to inject malicious SQL code remotely without requiring user interaction or authentication. This flaw enables an attacker to manipulate backend database queries, potentially leading to unauthorized data access, data modification, or even complete compromise of the database integrity. The vulnerability has been publicly disclosed, increasing the risk of exploitation, although no known exploits have been observed in the wild to date. The CVSS 4.0 base score is 5.3 (medium severity), reflecting network attack vector, low attack complexity, no privileges or user interaction required, but limited impact on confidentiality, integrity, and availability. The vulnerability affects a niche product used primarily by charitable organizations for managing donations and related activities, which may contain sensitive donor and financial information. Given the critical nature of data handled by charity management systems, exploitation could lead to significant data breaches or financial fraud if leveraged effectively.
Potential Impact
For European organizations, particularly charities and non-profits using the Advance Charity Management System, this vulnerability poses a risk of unauthorized access to sensitive donor information, financial records, and internal management data. Exploitation could result in data breaches compromising personal data protected under GDPR, leading to regulatory penalties and reputational damage. Additionally, attackers could manipulate donation records or financial transactions, potentially causing financial loss or fraud. The medium CVSS score suggests limited direct impact on system availability, but the integrity and confidentiality of critical data are at risk. Since the vulnerability can be exploited remotely without authentication, attackers could launch automated attacks at scale, increasing the threat to organizations with internet-facing instances of the affected software. The lack of patches or official fixes further exacerbates the risk, requiring organizations to implement compensating controls promptly.
Mitigation Recommendations
Given the absence of official patches, European organizations should immediately implement the following mitigations: 1) Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the 'm06' parameter in /members/fundDetails.php. 2) Conduct thorough input validation and sanitization on all user-supplied inputs, especially parameters used in SQL queries, ideally using parameterized queries or prepared statements if source code access is available. 3) Restrict database user permissions to the minimum necessary, preventing the application from performing destructive operations even if SQL injection occurs. 4) Monitor application logs and database query logs for anomalous or unexpected queries indicative of injection attempts. 5) Isolate the affected application in a segmented network zone to limit lateral movement in case of compromise. 6) Engage with SourceCodester or community forums to track any forthcoming patches or updates. 7) Consider migrating to alternative charity management solutions with better security track records if remediation is not feasible in the short term.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-06-19T10:49:15.089Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68568e83aded773421b5a976
Added to database: 6/21/2025, 10:50:43 AM
Last enriched: 6/21/2025, 12:23:04 PM
Last updated: 8/16/2025, 12:39:09 AM
Views: 10
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.