Skip to main content

CVE-2025-8926: SQL Injection in SourceCodester COVID 19 Testing Management System

Medium
VulnerabilityCVE-2025-8926cvecve-2025-8926
Published: Wed Aug 13 2025 (08/13/2025, 19:32:07 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: COVID 19 Testing Management System

Description

A vulnerability was found in SourceCodester COVID 19 Testing Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /login.php. The manipulation of the argument Username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 08/21/2025, 01:17:21 UTC

Technical Analysis

CVE-2025-8926 is a SQL Injection vulnerability identified in version 1.0 of the SourceCodester COVID 19 Testing Management System, specifically in the /login.php file. The vulnerability arises from improper sanitization or validation of the 'Username' parameter, allowing an attacker to inject malicious SQL code remotely without any authentication or user interaction. This flaw enables an attacker to manipulate backend database queries, potentially leading to unauthorized access, data leakage, or modification of sensitive information stored within the system's database. Given that the vulnerability is exploitable remotely and requires no privileges or user interaction, it presents a significant risk. The CVSS 4.0 base score of 6.9 (medium severity) reflects the moderate impact on confidentiality, integrity, and availability, with low complexity of attack and no need for authentication. The vulnerability affects a critical healthcare-related application managing COVID-19 testing data, which likely contains sensitive personal health information. Although no public exploits are currently known in the wild, the public disclosure of the exploit code increases the risk of exploitation by malicious actors. The lack of available patches or vendor advisories further exacerbates the threat landscape for users of this system.

Potential Impact

For European organizations, especially healthcare providers, public health authorities, and laboratories using the SourceCodester COVID 19 Testing Management System, this vulnerability poses a significant risk to patient data confidentiality and system integrity. Exploitation could lead to unauthorized disclosure of sensitive health data, manipulation of test results, or disruption of testing operations, undermining public health efforts and trust. Given the critical nature of COVID-19 testing data in managing the pandemic response, any compromise could have cascading effects on healthcare decision-making and epidemiological tracking. Additionally, data breaches involving personal health information are subject to strict regulatory penalties under GDPR, potentially resulting in substantial financial and reputational damage. The remote and unauthenticated nature of the exploit increases the likelihood of attacks, especially if the system is exposed to the internet or poorly segmented within networks.

Mitigation Recommendations

Organizations should immediately assess their deployment of the SourceCodester COVID 19 Testing Management System version 1.0 and restrict external access to the /login.php endpoint through network segmentation or firewall rules. Implementing Web Application Firewalls (WAFs) with SQL injection detection and prevention capabilities can provide an additional protective layer. Since no official patches are currently available, organizations should consider applying manual input validation and parameterized queries within the application code if feasible. Monitoring and logging login attempts and database query anomalies can help detect exploitation attempts early. Additionally, organizations should conduct thorough audits of their databases for signs of compromise and ensure that backups are securely maintained. Engaging with the vendor for patch releases or updates is critical, and organizations should plan for timely application of any forthcoming security patches. Finally, raising awareness among IT and security teams about this vulnerability and its exploitation vectors is essential for proactive defense.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-13T11:15:55.770Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 689cebe6ad5a09ad0051ed12

Added to database: 8/13/2025, 7:47:50 PM

Last enriched: 8/21/2025, 1:17:21 AM

Last updated: 9/25/2025, 7:51:53 AM

Views: 33

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats