Skip to main content

CVE-2025-8986: SQL Injection in SourceCodester COVID 19 Testing Management System

Medium
VulnerabilityCVE-2025-8986cvecve-2025-8986
Published: Thu Aug 14 2025 (08/14/2025, 22:02:06 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: COVID 19 Testing Management System

Description

A vulnerability was determined in SourceCodester COVID 19 Testing Management System 1.0. Affected by this issue is some unknown functionality of the file /search-report-result.php. The manipulation of the argument serachdata leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 08/14/2025, 22:33:02 UTC

Technical Analysis

CVE-2025-8986 is a SQL Injection vulnerability identified in SourceCodester COVID 19 Testing Management System version 1.0. The vulnerability resides in the /search-report-result.php file, specifically in the handling of the 'serachdata' parameter. An attacker can manipulate this parameter to inject malicious SQL code, allowing unauthorized access to the backend database. This flaw can be exploited remotely without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/AT:N/PR:N/UI:N). The vulnerability impacts the confidentiality, integrity, and availability of the system's data, as attackers could extract sensitive patient information, modify records, or disrupt the service. The CVSS score of 6.9 categorizes this as a medium severity issue, reflecting the ease of exploitation combined with the potential impact on data confidentiality and integrity. No patches or fixes have been publicly disclosed yet, and while no known exploits are currently in the wild, the public disclosure of the vulnerability increases the risk of exploitation by threat actors. The vulnerability affects a critical healthcare management system used for COVID-19 testing data, which is sensitive and subject to strict privacy regulations.

Potential Impact

For European organizations, the exploitation of this SQL Injection vulnerability could lead to significant data breaches involving sensitive health information, including COVID-19 test results and personal patient data. This could result in violations of the EU General Data Protection Regulation (GDPR), leading to legal penalties and reputational damage. The integrity of testing data could be compromised, affecting public health responses and trust in healthcare providers. Availability disruptions could hinder timely access to testing results, impacting patient care and pandemic management efforts. Healthcare providers, laboratories, and public health agencies using this system or similar SourceCodester products in Europe would be at risk. The medium severity rating suggests a moderate but tangible risk that requires prompt attention to prevent exploitation.

Mitigation Recommendations

European organizations should immediately audit their use of the SourceCodester COVID 19 Testing Management System version 1.0 and identify any instances of the vulnerable /search-report-result.php endpoint. Since no official patches are currently available, organizations should implement the following mitigations: 1) Apply input validation and sanitization on the 'serachdata' parameter to prevent SQL injection, using parameterized queries or prepared statements. 2) Employ Web Application Firewalls (WAFs) with SQL injection detection and blocking rules tailored to the vulnerable endpoint. 3) Restrict access to the vulnerable functionality by network segmentation or IP whitelisting where feasible. 4) Monitor logs for suspicious query patterns indicative of SQL injection attempts. 5) Plan for an upgrade or replacement of the affected system with a secure version once available. 6) Conduct security awareness training for developers and administrators on secure coding practices and vulnerability management. These steps will help mitigate risk until an official patch or update is released.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-13T16:55:02.145Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 689e608dad5a09ad005f45c3

Added to database: 8/14/2025, 10:17:49 PM

Last enriched: 8/14/2025, 10:33:02 PM

Last updated: 8/14/2025, 10:33:02 PM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats