CVE-2025-8987: SQL Injection in SourceCodester COVID 19 Testing Management System
A vulnerability was identified in SourceCodester COVID 19 Testing Management System 1.0. This affects an unknown part of the file /test-details.php. The manipulation of the argument remark leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-8987 is a SQL Injection vulnerability identified in SourceCodester COVID 19 Testing Management System version 1.0. The vulnerability exists in the /test-details.php file, specifically through the manipulation of the 'remark' parameter. An attacker can remotely exploit this flaw without any authentication or user interaction, by injecting malicious SQL code into the 'remark' argument. This leads to unauthorized access or modification of the backend database. The vulnerability has a CVSS 4.0 base score of 6.9, indicating a medium severity level. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact affects confidentiality, integrity, and availability to a limited extent (VC:L, VI:L, VA:L). The vulnerability scope is unchanged (S:U), and no security requirements are bypassed (SI:N, SA:N). Although no known exploits are currently active in the wild, the exploit details have been publicly disclosed, increasing the risk of exploitation. The vulnerability allows an attacker to execute arbitrary SQL commands, potentially leading to data leakage, data tampering, or denial of service by corrupting or deleting database records. Given the nature of the affected system—a COVID-19 testing management platform—compromise could result in exposure of sensitive health data, disruption of testing workflows, and loss of trust in public health infrastructure.
Potential Impact
For European organizations, this vulnerability poses significant risks, especially for healthcare providers, laboratories, and public health agencies using the affected system. Unauthorized access to COVID-19 test results and patient data could violate GDPR regulations, leading to legal penalties and reputational damage. Data integrity issues could cause incorrect test reporting, impacting public health decisions and patient care. Availability disruptions could delay testing processes during critical periods of the pandemic response. The medium severity rating suggests moderate but tangible risks, particularly because the vulnerability can be exploited remotely without authentication. European entities relying on SourceCodester's COVID-19 Testing Management System 1.0 should consider this a priority issue due to the sensitive nature of the data and the critical role of testing systems in managing the pandemic.
Mitigation Recommendations
Organizations should immediately assess their use of SourceCodester COVID 19 Testing Management System version 1.0 and plan for an upgrade or patch once available. In the absence of an official patch, implement web application firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the 'remark' parameter in /test-details.php. Conduct thorough input validation and sanitization on all user-supplied data, especially parameters that interact with the database. Employ parameterized queries or prepared statements in the application code to prevent injection. Monitor logs for suspicious database queries or unusual application behavior. Restrict database user permissions to the minimum necessary to limit the impact of any successful injection. Additionally, ensure that backups of critical data are current and tested to enable recovery from potential data corruption or deletion. Finally, raise awareness among IT and security teams about this vulnerability and the importance of rapid response.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Netherlands, Belgium, Sweden, Poland
CVE-2025-8987: SQL Injection in SourceCodester COVID 19 Testing Management System
Description
A vulnerability was identified in SourceCodester COVID 19 Testing Management System 1.0. This affects an unknown part of the file /test-details.php. The manipulation of the argument remark leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-8987 is a SQL Injection vulnerability identified in SourceCodester COVID 19 Testing Management System version 1.0. The vulnerability exists in the /test-details.php file, specifically through the manipulation of the 'remark' parameter. An attacker can remotely exploit this flaw without any authentication or user interaction, by injecting malicious SQL code into the 'remark' argument. This leads to unauthorized access or modification of the backend database. The vulnerability has a CVSS 4.0 base score of 6.9, indicating a medium severity level. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact affects confidentiality, integrity, and availability to a limited extent (VC:L, VI:L, VA:L). The vulnerability scope is unchanged (S:U), and no security requirements are bypassed (SI:N, SA:N). Although no known exploits are currently active in the wild, the exploit details have been publicly disclosed, increasing the risk of exploitation. The vulnerability allows an attacker to execute arbitrary SQL commands, potentially leading to data leakage, data tampering, or denial of service by corrupting or deleting database records. Given the nature of the affected system—a COVID-19 testing management platform—compromise could result in exposure of sensitive health data, disruption of testing workflows, and loss of trust in public health infrastructure.
Potential Impact
For European organizations, this vulnerability poses significant risks, especially for healthcare providers, laboratories, and public health agencies using the affected system. Unauthorized access to COVID-19 test results and patient data could violate GDPR regulations, leading to legal penalties and reputational damage. Data integrity issues could cause incorrect test reporting, impacting public health decisions and patient care. Availability disruptions could delay testing processes during critical periods of the pandemic response. The medium severity rating suggests moderate but tangible risks, particularly because the vulnerability can be exploited remotely without authentication. European entities relying on SourceCodester's COVID-19 Testing Management System 1.0 should consider this a priority issue due to the sensitive nature of the data and the critical role of testing systems in managing the pandemic.
Mitigation Recommendations
Organizations should immediately assess their use of SourceCodester COVID 19 Testing Management System version 1.0 and plan for an upgrade or patch once available. In the absence of an official patch, implement web application firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the 'remark' parameter in /test-details.php. Conduct thorough input validation and sanitization on all user-supplied data, especially parameters that interact with the database. Employ parameterized queries or prepared statements in the application code to prevent injection. Monitor logs for suspicious database queries or unusual application behavior. Restrict database user permissions to the minimum necessary to limit the impact of any successful injection. Additionally, ensure that backups of critical data are current and tested to enable recovery from potential data corruption or deletion. Finally, raise awareness among IT and security teams about this vulnerability and the importance of rapid response.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-13T16:55:04.508Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 689e6795ad5a09ad005f7e73
Added to database: 8/14/2025, 10:47:49 PM
Last enriched: 8/22/2025, 1:05:56 AM
Last updated: 9/26/2025, 5:15:57 PM
Views: 31
Related Threats
CVE-2025-9816: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in veronalabs WP Statistics – Simple, privacy-friendly Google Analytics alternative
HighCVE-2025-11050: Improper Authorization in Portabilis i-Educar
MediumCVE-2025-10499: CWE-352 Cross-Site Request Forgery (CSRF) in kstover Ninja Forms – The Contact Form Builder That Grows With You
MediumCVE-2025-10498: CWE-352 Cross-Site Request Forgery (CSRF) in kstover Ninja Forms – The Contact Form Builder That Grows With You
MediumCVE-2025-8440: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in spwebguy Team Members
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.