Skip to main content

CVE-2025-6346: SQL Injection in SourceCodester Advance Charity Management System

Medium
VulnerabilityCVE-2025-6346cvecve-2025-6346
Published: Fri Jun 20 2025 (06/20/2025, 15:00:15 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: Advance Charity Management System

Description

A vulnerability was found in SourceCodester Advance Charity Management System 1.0. It has been classified as critical. This affects an unknown part of the file /members/fundDetails.php. The manipulation of the argument m06 leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 06/21/2025, 12:23:04 UTC

Technical Analysis

CVE-2025-6346 is a SQL Injection vulnerability identified in version 1.0 of the SourceCodester Advance Charity Management System, specifically within the /members/fundDetails.php file. The vulnerability arises from improper sanitization or validation of the 'm06' parameter, which allows an attacker to inject malicious SQL code remotely without requiring user interaction or authentication. This flaw enables an attacker to manipulate backend database queries, potentially leading to unauthorized data access, data modification, or even complete compromise of the database integrity. The vulnerability has been publicly disclosed, increasing the risk of exploitation, although no known exploits have been observed in the wild to date. The CVSS 4.0 base score is 5.3 (medium severity), reflecting network attack vector, low attack complexity, no privileges or user interaction required, but limited impact on confidentiality, integrity, and availability. The vulnerability affects a niche product used primarily by charitable organizations for managing donations and related activities, which may contain sensitive donor and financial information. Given the critical nature of data handled by charity management systems, exploitation could lead to significant data breaches or financial fraud if leveraged effectively.

Potential Impact

For European organizations, particularly charities and non-profits using the Advance Charity Management System, this vulnerability poses a risk of unauthorized access to sensitive donor information, financial records, and internal management data. Exploitation could result in data breaches compromising personal data protected under GDPR, leading to regulatory penalties and reputational damage. Additionally, attackers could manipulate donation records or financial transactions, potentially causing financial loss or fraud. The medium CVSS score suggests limited direct impact on system availability, but the integrity and confidentiality of critical data are at risk. Since the vulnerability can be exploited remotely without authentication, attackers could launch automated attacks at scale, increasing the threat to organizations with internet-facing instances of the affected software. The lack of patches or official fixes further exacerbates the risk, requiring organizations to implement compensating controls promptly.

Mitigation Recommendations

Given the absence of official patches, European organizations should immediately implement the following mitigations: 1) Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the 'm06' parameter in /members/fundDetails.php. 2) Conduct thorough input validation and sanitization on all user-supplied inputs, especially parameters used in SQL queries, ideally using parameterized queries or prepared statements if source code access is available. 3) Restrict database user permissions to the minimum necessary, preventing the application from performing destructive operations even if SQL injection occurs. 4) Monitor application logs and database query logs for anomalous or unexpected queries indicative of injection attempts. 5) Isolate the affected application in a segmented network zone to limit lateral movement in case of compromise. 6) Engage with SourceCodester or community forums to track any forthcoming patches or updates. 7) Consider migrating to alternative charity management solutions with better security track records if remediation is not feasible in the short term.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-06-19T10:49:15.089Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68568e83aded773421b5a976

Added to database: 6/21/2025, 10:50:43 AM

Last enriched: 6/21/2025, 12:23:04 PM

Last updated: 8/16/2025, 12:39:09 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats