Skip to main content

CVE-2025-8926: SQL Injection in SourceCodester COVID 19 Testing Management System

Medium
VulnerabilityCVE-2025-8926cvecve-2025-8926
Published: Wed Aug 13 2025 (08/13/2025, 19:32:07 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: COVID 19 Testing Management System

Description

A vulnerability was found in SourceCodester COVID 19 Testing Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /login.php. The manipulation of the argument Username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 08/13/2025, 20:02:45 UTC

Technical Analysis

CVE-2025-8926 is a SQL Injection vulnerability identified in version 1.0 of the SourceCodester COVID 19 Testing Management System, specifically in the /login.php file. The vulnerability arises from improper sanitization of the 'Username' parameter, allowing an attacker to inject malicious SQL code. This injection flaw can be exploited remotely without requiring authentication or user interaction, enabling an attacker to manipulate backend database queries. The vulnerability impacts the confidentiality, integrity, and availability of the system's data, as attackers could extract sensitive information, modify or delete records, or disrupt service operations. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the ease of exploitation (network attack vector, no privileges or user interaction needed) and the potential for limited impact on confidentiality, integrity, and availability. Although no public exploits are currently known in the wild, the disclosure of the vulnerability and its exploit code availability increases the risk of exploitation. The affected system is a COVID 19 Testing Management System, which likely handles sensitive health data, patient records, and testing results, making the vulnerability particularly critical in healthcare contexts.

Potential Impact

For European organizations, especially healthcare providers, public health agencies, and laboratories using the SourceCodester COVID 19 Testing Management System, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to personal health information, violating GDPR and other data protection regulations, resulting in legal and financial penalties. Data tampering could undermine the integrity of COVID-19 testing data, affecting public health responses and trust in testing results. Service disruption could delay testing workflows, impacting patient care and pandemic management efforts. Given the critical nature of health data and the ongoing importance of COVID-19 testing infrastructure, the vulnerability could have broad operational and reputational consequences for affected European entities.

Mitigation Recommendations

Since no official patches are currently available, European organizations should implement immediate compensating controls. These include deploying web application firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the /login.php endpoint and the 'Username' parameter. Input validation and sanitization should be enforced at the application level, ideally by reviewing and updating the source code to use parameterized queries or prepared statements to eliminate injection vectors. Network segmentation and strict access controls should limit exposure of the affected system to only trusted internal networks. Continuous monitoring and logging of login attempts and database queries can help detect suspicious activity early. Organizations should also prepare for rapid patch deployment once an official fix is released and consider alternative secure COVID-19 management solutions if remediation is delayed.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-13T11:15:55.770Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 689cebe6ad5a09ad0051ed12

Added to database: 8/13/2025, 7:47:50 PM

Last enriched: 8/13/2025, 8:02:45 PM

Last updated: 8/14/2025, 2:10:52 PM

Views: 7

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats