Skip to main content

CVE-2025-8986: SQL Injection in SourceCodester COVID 19 Testing Management System

Medium
VulnerabilityCVE-2025-8986cvecve-2025-8986
Published: Thu Aug 14 2025 (08/14/2025, 22:02:06 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: COVID 19 Testing Management System

Description

A vulnerability was determined in SourceCodester COVID 19 Testing Management System 1.0. Affected by this issue is some unknown functionality of the file /search-report-result.php. The manipulation of the argument serachdata leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 08/22/2025, 01:13:27 UTC

Technical Analysis

CVE-2025-8986 is a SQL Injection vulnerability identified in version 1.0 of the SourceCodester COVID 19 Testing Management System. The vulnerability exists in the /search-report-result.php file, specifically in the handling of the 'serachdata' parameter. Due to insufficient input validation or sanitization, an attacker can manipulate this parameter to inject malicious SQL code. This flaw allows remote attackers to execute arbitrary SQL commands on the backend database without requiring authentication or user interaction. The vulnerability has a CVSS 4.0 base score of 6.9, indicating a medium severity level. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact affects confidentiality, integrity, and availability to a limited extent (VC:L, VI:L, VA:L). The scope remains unchanged (S:N). The exploit has been publicly disclosed but there are no known exploits actively used in the wild at this time. The vulnerability could allow attackers to extract sensitive patient data, modify or delete records, or disrupt the availability of the COVID-19 testing management system, which is critical for healthcare operations and public health monitoring.

Potential Impact

For European organizations, particularly healthcare providers and public health authorities using this COVID-19 Testing Management System, the impact could be significant. Exploitation could lead to unauthorized disclosure of sensitive personal health information, violating GDPR and other privacy regulations, resulting in legal and reputational damage. Integrity compromises could undermine the reliability of COVID-19 test results and reporting, affecting patient care and public health decisions. Availability impacts could disrupt testing workflows, delaying diagnosis and containment efforts. Given the critical role of COVID-19 testing systems in managing the pandemic response, any disruption or data breach could have cascading effects on healthcare delivery and public trust. Additionally, attackers could leverage the vulnerability as a foothold for further network intrusion or lateral movement within healthcare IT environments.

Mitigation Recommendations

Organizations should immediately review and restrict access to the /search-report-result.php endpoint, implementing web application firewalls (WAFs) with rules to detect and block SQL injection attempts targeting the 'serachdata' parameter. Input validation and parameterized queries or prepared statements must be enforced in the application code to eliminate injection vectors. Since no official patch is currently available, organizations should consider isolating the affected system from public networks or limiting access to trusted IP addresses. Regular monitoring of logs for suspicious query patterns and anomalous database activity is essential. Additionally, organizations should conduct thorough security assessments of all web-facing applications handling sensitive health data to identify similar injection flaws. Preparing incident response plans for potential data breaches related to this vulnerability is also recommended.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-13T16:55:02.145Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 689e608dad5a09ad005f45c3

Added to database: 8/14/2025, 10:17:49 PM

Last enriched: 8/22/2025, 1:13:27 AM

Last updated: 9/27/2025, 7:24:19 AM

Views: 32

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats