Skip to main content

CVE-2025-8989: SQL Injection in SourceCodester COVID 19 Testing Management System

Medium
VulnerabilityCVE-2025-8989cvecve-2025-8989
Published: Thu Aug 14 2025 (08/14/2025, 23:32:06 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: COVID 19 Testing Management System

Description

A vulnerability was found in SourceCodester COVID 19 Testing Management System 1.0. This issue affects some unknown processing of the file /edit-phlebotomist.php. The manipulation of the argument mobilenumber leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.

AI-Powered Analysis

AILast updated: 08/22/2025, 01:08:44 UTC

Technical Analysis

CVE-2025-8989 is a SQL Injection vulnerability identified in SourceCodester COVID 19 Testing Management System version 1.0. The vulnerability arises from improper sanitization or validation of the 'mobilenumber' parameter in the /edit-phlebotomist.php script. An attacker can remotely manipulate this parameter to inject malicious SQL code, potentially allowing unauthorized access to the underlying database. This could lead to unauthorized data retrieval, modification, or deletion. The vulnerability does not require authentication or user interaction, increasing its risk profile. Although the CVSS score is 6.9 (medium severity), the exploitability is high due to network accessibility and lack of required privileges. The vulnerability may also affect other parameters, indicating a broader input validation issue within the application. No official patches have been released yet, and no known exploits are reported in the wild, but public disclosure increases the risk of exploitation attempts. The COVID 19 Testing Management System is likely used by healthcare providers and testing centers to manage patient and testing data, making the confidentiality and integrity of sensitive health information a critical concern.

Potential Impact

For European organizations, especially healthcare providers and public health authorities using this system, the impact could be significant. Exploitation could lead to unauthorized access to sensitive personal health information, violating GDPR and other data protection regulations, resulting in legal and financial penalties. Data integrity could be compromised, affecting the accuracy of COVID-19 testing records and potentially leading to public health risks. Availability might also be impacted if attackers manipulate or delete data, disrupting testing operations. Given the critical nature of pandemic response infrastructure, any disruption or data breach could undermine public trust and hamper health crisis management efforts across Europe.

Mitigation Recommendations

Organizations should immediately audit their use of the SourceCodester COVID 19 Testing Management System and restrict external access to the /edit-phlebotomist.php endpoint. Implementing a Web Application Firewall (WAF) with SQL injection detection rules can provide immediate protection. Input validation and parameterized queries should be enforced in the application code to prevent injection attacks. Since no official patch is available, organizations should consider isolating the vulnerable system from the internet or placing it behind strict network segmentation. Regular database backups and monitoring for unusual database queries or access patterns are recommended. Additionally, organizations should prepare incident response plans specific to potential data breaches involving health data. Engaging with the vendor for updates or patches and planning for timely application of fixes once available is critical.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-13T16:55:09.638Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 689e75a7ad5a09ad005fc0da

Added to database: 8/14/2025, 11:47:51 PM

Last enriched: 8/22/2025, 1:08:44 AM

Last updated: 9/27/2025, 2:34:28 PM

Views: 30

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats