Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-70141: n/a

0
Critical
VulnerabilityCVE-2025-70141cvecve-2025-70141
Published: Wed Feb 18 2026 (02/18/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

SourceCodester Customer Support System 1.0 contains an incorrect access control vulnerability in ajax.php. The AJAX dispatcher does not enforce authentication or authorization before invoking administrative methods in admin_class.php based on the action parameter. An unauthenticated remote attacker can perform sensitive operations such as creating customers and deleting users (including the admin account), as well as modifying or deleting other application records (tickets, departments, comments), resulting in unauthorized data modification.

AI-Powered Analysis

AILast updated: 02/19/2026, 12:06:16 UTC

Technical Analysis

CVE-2025-70141 identifies a critical security vulnerability in SourceCodester Customer Support System version 1.0, specifically within the ajax.php script that acts as an AJAX dispatcher. The vulnerability arises because ajax.php fails to enforce proper authentication and authorization checks before invoking administrative methods defined in admin_class.php. These administrative methods are triggered based on the 'action' parameter passed in AJAX requests. Due to this lack of access control, an unauthenticated remote attacker can execute sensitive administrative operations such as creating new customer records, deleting user accounts including privileged admin accounts, and modifying or deleting other critical application data like support tickets, departments, and comments. This results in unauthorized data modification and potentially complete compromise of the customer support system's integrity and availability. The vulnerability is classified under CWE-306 (Missing Authentication for Critical Function) and CWE-862 (Missing Authorization). The CVSS v3.1 score is 9.4 (Critical), reflecting that the attack can be performed remotely over the network without any privileges or user interaction, and it impacts confidentiality (limited), integrity (high), and availability (high). As of the published date, no patches or fixes have been released, and no active exploitation has been reported. The vulnerability poses a significant risk to organizations relying on this software for customer support operations, as attackers can disrupt services, manipulate data, and remove administrative controls.

Potential Impact

For European organizations, exploitation of CVE-2025-70141 could lead to severe operational disruption of customer support services, unauthorized data manipulation, and potential loss of administrative control over the system. This could result in compromised customer data integrity, deletion of critical support tickets, and unauthorized creation or removal of user accounts, including administrators. The impact extends to reputational damage, regulatory non-compliance (especially under GDPR due to potential data integrity and availability issues), and financial losses from service downtime and recovery efforts. Organizations that heavily depend on SourceCodester Customer Support System for managing customer interactions and support workflows are particularly vulnerable. The ability for unauthenticated attackers to perform these actions remotely increases the risk of widespread exploitation if the vulnerability is publicly disclosed or weaponized. Additionally, the lack of available patches means that affected organizations must rely on immediate compensating controls to mitigate risk.

Mitigation Recommendations

1. Immediately restrict access to ajax.php by implementing strict authentication and authorization checks to ensure only legitimate, authenticated users with appropriate privileges can invoke administrative actions. 2. Employ web application firewalls (WAFs) to detect and block suspicious requests targeting ajax.php, especially those attempting to manipulate the 'action' parameter. 3. Conduct a thorough audit of user accounts and application logs to identify any unauthorized changes or suspicious activity. 4. Isolate or temporarily disable the vulnerable functionality if feasible until a vendor patch or official fix is available. 5. Monitor network traffic for anomalous patterns indicative of exploitation attempts. 6. Engage with the software vendor or community to obtain or develop patches or updates addressing the vulnerability. 7. Implement network segmentation to limit exposure of the customer support system to untrusted networks. 8. Educate IT and security teams about this vulnerability and ensure incident response plans include scenarios involving unauthorized administrative access. 9. Regularly back up critical application data and verify backup integrity to enable recovery in case of data tampering or deletion.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6996fb498fb9188dea8c09a8

Added to database: 2/19/2026, 12:00:09 PM

Last enriched: 2/19/2026, 12:06:16 PM

Last updated: 2/21/2026, 12:16:56 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats