CVE-2025-9002: SQL Injection in Surbowl dormitory-management-php
A vulnerability was identified in Surbowl dormitory-management-php 1.0. This affects an unknown part of the file login.php. The manipulation of the argument Account leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
AI Analysis
Technical Summary
CVE-2025-9002 is a SQL Injection vulnerability found in Surbowl dormitory-management-php version 1.0, specifically within an unspecified part of the login.php file. The vulnerability arises from improper sanitization or validation of the 'Account' parameter, allowing an attacker to inject malicious SQL code remotely without any authentication or user interaction. This can lead to unauthorized access to the underlying database, potentially exposing sensitive user credentials or other data stored within the dormitory management system. The product is no longer supported by the vendor, meaning no official patches or updates are available to remediate this flaw. The CVSS v4.0 base score is 6.9 (medium severity), reflecting the network attack vector, low complexity, no privileges or user interaction required, but with limited impact on confidentiality, integrity, and availability. Although no known exploits are currently observed in the wild, the public disclosure of the vulnerability increases the risk of exploitation by attackers targeting vulnerable deployments. The dormitory-management-php system is likely used in educational or residential institutions to manage dormitory operations, making the data potentially sensitive and critical for operational continuity.
Potential Impact
For European organizations, particularly educational institutions or housing authorities using Surbowl dormitory-management-php 1.0, this vulnerability poses a significant risk. Exploitation could lead to unauthorized database access, exposing personal data of residents or students, including login credentials and possibly financial or administrative information. This could result in data breaches violating GDPR regulations, leading to legal penalties and reputational damage. Additionally, attackers could manipulate or delete records, disrupting dormitory management operations and availability of services. The lack of vendor support means organizations must rely on internal or third-party remediation efforts, increasing operational burden. Given the remote and unauthenticated nature of the attack, widespread scanning and exploitation attempts could target vulnerable European institutions, especially those with limited cybersecurity resources.
Mitigation Recommendations
Since no official patches are available, European organizations should implement compensating controls immediately. These include: 1) Deploying Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'Account' parameter in login.php. 2) Conducting thorough code reviews and applying manual input validation and parameterized queries or prepared statements in the login.php script to sanitize inputs. 3) Restricting database user permissions to the minimum necessary to limit the impact of any injection. 4) Monitoring logs for suspicious SQL queries or repeated failed login attempts indicative of injection attempts. 5) Isolating or segmenting the dormitory management system network to reduce exposure. 6) Considering migration to alternative supported dormitory management solutions or developing an in-house replacement. 7) Educating IT staff about the vulnerability and ensuring incident response plans are updated to handle potential exploitation. These measures should be prioritized given the absence of vendor patches and the criticality of protecting personal data under GDPR.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2025-9002: SQL Injection in Surbowl dormitory-management-php
Description
A vulnerability was identified in Surbowl dormitory-management-php 1.0. This affects an unknown part of the file login.php. The manipulation of the argument Account leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
AI-Powered Analysis
Technical Analysis
CVE-2025-9002 is a SQL Injection vulnerability found in Surbowl dormitory-management-php version 1.0, specifically within an unspecified part of the login.php file. The vulnerability arises from improper sanitization or validation of the 'Account' parameter, allowing an attacker to inject malicious SQL code remotely without any authentication or user interaction. This can lead to unauthorized access to the underlying database, potentially exposing sensitive user credentials or other data stored within the dormitory management system. The product is no longer supported by the vendor, meaning no official patches or updates are available to remediate this flaw. The CVSS v4.0 base score is 6.9 (medium severity), reflecting the network attack vector, low complexity, no privileges or user interaction required, but with limited impact on confidentiality, integrity, and availability. Although no known exploits are currently observed in the wild, the public disclosure of the vulnerability increases the risk of exploitation by attackers targeting vulnerable deployments. The dormitory-management-php system is likely used in educational or residential institutions to manage dormitory operations, making the data potentially sensitive and critical for operational continuity.
Potential Impact
For European organizations, particularly educational institutions or housing authorities using Surbowl dormitory-management-php 1.0, this vulnerability poses a significant risk. Exploitation could lead to unauthorized database access, exposing personal data of residents or students, including login credentials and possibly financial or administrative information. This could result in data breaches violating GDPR regulations, leading to legal penalties and reputational damage. Additionally, attackers could manipulate or delete records, disrupting dormitory management operations and availability of services. The lack of vendor support means organizations must rely on internal or third-party remediation efforts, increasing operational burden. Given the remote and unauthenticated nature of the attack, widespread scanning and exploitation attempts could target vulnerable European institutions, especially those with limited cybersecurity resources.
Mitigation Recommendations
Since no official patches are available, European organizations should implement compensating controls immediately. These include: 1) Deploying Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'Account' parameter in login.php. 2) Conducting thorough code reviews and applying manual input validation and parameterized queries or prepared statements in the login.php script to sanitize inputs. 3) Restricting database user permissions to the minimum necessary to limit the impact of any injection. 4) Monitoring logs for suspicious SQL queries or repeated failed login attempts indicative of injection attempts. 5) Isolating or segmenting the dormitory management system network to reduce exposure. 6) Considering migration to alternative supported dormitory management solutions or developing an in-house replacement. 7) Educating IT staff about the vulnerability and ensuring incident response plans are updated to handle potential exploitation. These measures should be prioritized given the absence of vendor patches and the criticality of protecting personal data under GDPR.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-13T18:57:55.652Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 689e9c51ad5a09ad00615fce
Added to database: 8/15/2025, 2:32:49 AM
Last enriched: 8/15/2025, 2:48:23 AM
Last updated: 11/8/2025, 8:53:56 AM
Views: 44
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12099: CWE-502 Deserialization of Untrusted Data in academylms Academy LMS – WordPress LMS Plugin for Complete eLearning Solution
HighCVE-2025-12098: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in academylms Academy LMS Pro
MediumCVE-2023-3750: Improper Locking in Red Hat Red Hat Enterprise Linux 9
MediumCVE-2025-12621: CWE-863 Incorrect Authorization in wpdesk Flexible Refund and Return Order for WooCommerce
MediumCVE-2024-4693: Operation on a Resource after Expiration or Release
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.