CVE-2025-63891: n/a
Information Disclosure in web-accessible backup file in SourceCodester Simple Online Book Store System allows a remote unauthenticated attacker to disclose full database contents (including schema and credential hashes) via an unauthenticated HTTP GET request to /obs/database/obs_db.sql.
AI Analysis
Technical Summary
CVE-2025-63891 is an information disclosure vulnerability identified in the SourceCodester Simple Online Book Store System. The vulnerability arises because a backup database file (obs_db.sql) is left accessible via a web server endpoint (/obs/database/obs_db.sql) without any authentication or access control. This file contains the entire database dump, including sensitive information such as database schema and credential hashes. An attacker can exploit this by sending an unauthenticated HTTP GET request to the specified URL, retrieving the backup file and thereby gaining access to sensitive data. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). The CVSS v3.1 base score is 7.5, indicating high severity, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impact limited to confidentiality (C:H/I:N/A:N). No patches or fixes are currently listed, and no exploits have been reported in the wild yet. The vulnerability's root cause is improper server configuration or failure to restrict access to backup files, a common security oversight in web application deployment.
Potential Impact
For European organizations, this vulnerability can lead to significant data breaches involving customer information, internal database structures, and credential hashes. Exposure of credential hashes increases the risk of credential cracking and subsequent unauthorized access to systems, potentially leading to lateral movement or privilege escalation. Organizations relying on the affected SourceCodester system or similar vulnerable web applications may face compliance violations under GDPR due to unauthorized personal data exposure. The breach of database schema details also aids attackers in crafting more targeted attacks. The lack of authentication requirement and ease of exploitation make this vulnerability particularly dangerous, potentially affecting availability indirectly if attackers leverage the disclosed information to disrupt services. The reputational damage and financial penalties from data breaches could be substantial for affected European entities.
Mitigation Recommendations
Immediate mitigation steps include removing or restricting access to backup files on the web server, ensuring that database dumps are never stored in web-accessible directories. Implement strict access controls and authentication mechanisms for any sensitive files or endpoints. Conduct a thorough audit of the web server and application configuration to identify and secure any other exposed sensitive files. Employ web application firewalls (WAF) to detect and block unauthorized access attempts to sensitive paths. Regularly review and update deployment procedures to prevent accidental exposure of backup or configuration files. Additionally, enforce strong password policies and consider multi-factor authentication to mitigate risks from compromised credential hashes. Organizations should monitor logs for suspicious access patterns and prepare incident response plans in case of exploitation. Finally, coordinate with the vendor or community maintaining the SourceCodester system to obtain patches or updates once available.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Austria
CVE-2025-63891: n/a
Description
Information Disclosure in web-accessible backup file in SourceCodester Simple Online Book Store System allows a remote unauthenticated attacker to disclose full database contents (including schema and credential hashes) via an unauthenticated HTTP GET request to /obs/database/obs_db.sql.
AI-Powered Analysis
Technical Analysis
CVE-2025-63891 is an information disclosure vulnerability identified in the SourceCodester Simple Online Book Store System. The vulnerability arises because a backup database file (obs_db.sql) is left accessible via a web server endpoint (/obs/database/obs_db.sql) without any authentication or access control. This file contains the entire database dump, including sensitive information such as database schema and credential hashes. An attacker can exploit this by sending an unauthenticated HTTP GET request to the specified URL, retrieving the backup file and thereby gaining access to sensitive data. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). The CVSS v3.1 base score is 7.5, indicating high severity, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impact limited to confidentiality (C:H/I:N/A:N). No patches or fixes are currently listed, and no exploits have been reported in the wild yet. The vulnerability's root cause is improper server configuration or failure to restrict access to backup files, a common security oversight in web application deployment.
Potential Impact
For European organizations, this vulnerability can lead to significant data breaches involving customer information, internal database structures, and credential hashes. Exposure of credential hashes increases the risk of credential cracking and subsequent unauthorized access to systems, potentially leading to lateral movement or privilege escalation. Organizations relying on the affected SourceCodester system or similar vulnerable web applications may face compliance violations under GDPR due to unauthorized personal data exposure. The breach of database schema details also aids attackers in crafting more targeted attacks. The lack of authentication requirement and ease of exploitation make this vulnerability particularly dangerous, potentially affecting availability indirectly if attackers leverage the disclosed information to disrupt services. The reputational damage and financial penalties from data breaches could be substantial for affected European entities.
Mitigation Recommendations
Immediate mitigation steps include removing or restricting access to backup files on the web server, ensuring that database dumps are never stored in web-accessible directories. Implement strict access controls and authentication mechanisms for any sensitive files or endpoints. Conduct a thorough audit of the web server and application configuration to identify and secure any other exposed sensitive files. Employ web application firewalls (WAF) to detect and block unauthorized access attempts to sensitive paths. Regularly review and update deployment procedures to prevent accidental exposure of backup or configuration files. Additionally, enforce strong password policies and consider multi-factor authentication to mitigate risks from compromised credential hashes. Organizations should monitor logs for suspicious access patterns and prepare incident response plans in case of exploitation. Finally, coordinate with the vendor or community maintaining the SourceCodester system to obtain patches or updates once available.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-10-27T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69179229d767b187e93e4612
Added to database: 11/14/2025, 8:33:45 PM
Last enriched: 11/21/2025, 8:59:56 PM
Last updated: 12/30/2025, 9:02:21 AM
Views: 71
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15103: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in Delta Electronics DVP-12SE11T
HighCVE-2025-15102: CWE-288 Authentication Bypass Using an Alternate Path or Channel in Delta Electronics DVP-12SE11T
CriticalCVE-2023-36377: n/a
UnknownCVE-2025-15233: Heap-based Buffer Overflow in Tenda M3
HighCVE-2025-15355: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in NetVision Information ISOinsight
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.