Skip to main content

CVE-2025-9002: SQL Injection in Surbowl dormitory-management-php

Medium
VulnerabilityCVE-2025-9002cvecve-2025-9002
Published: Fri Aug 15 2025 (08/15/2025, 02:02:07 UTC)
Source: CVE Database V5
Vendor/Project: Surbowl
Product: dormitory-management-php

Description

A vulnerability was identified in Surbowl dormitory-management-php 1.0. This affects an unknown part of the file login.php. The manipulation of the argument Account leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

AI-Powered Analysis

AILast updated: 08/15/2025, 02:48:23 UTC

Technical Analysis

CVE-2025-9002 is a SQL Injection vulnerability found in Surbowl dormitory-management-php version 1.0, specifically within an unspecified part of the login.php file. The vulnerability arises from improper sanitization or validation of the 'Account' parameter, allowing an attacker to inject malicious SQL code remotely without any authentication or user interaction. This can lead to unauthorized access to the underlying database, potentially exposing sensitive user credentials or other data stored within the dormitory management system. The product is no longer supported by the vendor, meaning no official patches or updates are available to remediate this flaw. The CVSS v4.0 base score is 6.9 (medium severity), reflecting the network attack vector, low complexity, no privileges or user interaction required, but with limited impact on confidentiality, integrity, and availability. Although no known exploits are currently observed in the wild, the public disclosure of the vulnerability increases the risk of exploitation by attackers targeting vulnerable deployments. The dormitory-management-php system is likely used in educational or residential institutions to manage dormitory operations, making the data potentially sensitive and critical for operational continuity.

Potential Impact

For European organizations, particularly educational institutions or housing authorities using Surbowl dormitory-management-php 1.0, this vulnerability poses a significant risk. Exploitation could lead to unauthorized database access, exposing personal data of residents or students, including login credentials and possibly financial or administrative information. This could result in data breaches violating GDPR regulations, leading to legal penalties and reputational damage. Additionally, attackers could manipulate or delete records, disrupting dormitory management operations and availability of services. The lack of vendor support means organizations must rely on internal or third-party remediation efforts, increasing operational burden. Given the remote and unauthenticated nature of the attack, widespread scanning and exploitation attempts could target vulnerable European institutions, especially those with limited cybersecurity resources.

Mitigation Recommendations

Since no official patches are available, European organizations should implement compensating controls immediately. These include: 1) Deploying Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'Account' parameter in login.php. 2) Conducting thorough code reviews and applying manual input validation and parameterized queries or prepared statements in the login.php script to sanitize inputs. 3) Restricting database user permissions to the minimum necessary to limit the impact of any injection. 4) Monitoring logs for suspicious SQL queries or repeated failed login attempts indicative of injection attempts. 5) Isolating or segmenting the dormitory management system network to reduce exposure. 6) Considering migration to alternative supported dormitory management solutions or developing an in-house replacement. 7) Educating IT staff about the vulnerability and ensuring incident response plans are updated to handle potential exploitation. These measures should be prioritized given the absence of vendor patches and the criticality of protecting personal data under GDPR.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-13T18:57:55.652Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 689e9c51ad5a09ad00615fce

Added to database: 8/15/2025, 2:32:49 AM

Last enriched: 8/15/2025, 2:48:23 AM

Last updated: 8/15/2025, 2:48:23 AM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats