Skip to main content

CVE-2025-9021: SQL Injection in SourceCodester Online Bank Management System

Medium
VulnerabilityCVE-2025-9021cvecve-2025-9021
Published: Fri Aug 15 2025 (08/15/2025, 08:02:06 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: Online Bank Management System

Description

A vulnerability was determined in SourceCodester Online Bank Management System up to 1.0. This vulnerability affects unknown code of the file /bank/transfer.php. The manipulation of the argument email leads to sql injection. The attack can be initiated remotely.

AI-Powered Analysis

AILast updated: 08/15/2025, 08:33:09 UTC

Technical Analysis

CVE-2025-9021 is a SQL Injection vulnerability identified in the SourceCodester Online Bank Management System version 1.0, specifically within the /bank/transfer.php file. The vulnerability arises from improper sanitization or validation of the 'email' parameter, which can be manipulated by an attacker to inject malicious SQL code. This injection flaw allows an unauthenticated remote attacker to execute arbitrary SQL commands on the backend database without requiring user interaction or prior authentication. The vulnerability has a CVSS 4.0 base score of 6.9, indicating a medium severity level. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact on confidentiality, integrity, and availability is low to limited (VC:L, VI:L, VA:L), suggesting that while the attacker can manipulate data, the scope of damage is somewhat constrained. The vulnerability does not affect system confidentiality, integrity, or availability at a critical level but still poses a significant risk, especially in a banking context where sensitive financial data and transactions are involved. No known exploits are currently reported in the wild, and no patches or mitigations have been officially released by the vendor as of the publication date. The vulnerability is exploitable remotely, making it a critical concern for any deployment of this software in production environments.

Potential Impact

For European organizations using the SourceCodester Online Bank Management System 1.0, this SQL Injection vulnerability could lead to unauthorized access to sensitive banking data, including customer information and transaction records. Although the CVSS score suggests medium severity, the financial sector's sensitivity amplifies the potential impact. Exploitation could result in data leakage, unauthorized fund transfers, or manipulation of transaction records, undermining customer trust and potentially violating stringent European data protection regulations such as GDPR. The ability to exploit this vulnerability remotely without authentication increases the risk of automated attacks or exploitation by cybercriminal groups targeting financial institutions. Furthermore, compromised banking systems could be used as pivot points for broader network intrusions, increasing the overall risk posture of affected organizations. The lack of available patches means organizations must rely on other mitigations, increasing operational complexity and risk exposure.

Mitigation Recommendations

Given the absence of official patches, European organizations should implement immediate compensating controls. First, deploy web application firewalls (WAFs) with custom rules to detect and block SQL injection patterns, specifically targeting the 'email' parameter in requests to /bank/transfer.php. Conduct thorough input validation and sanitization on all user-supplied data, ideally by implementing parameterized queries or prepared statements within the application code if source code access is available. Restrict database user permissions to the minimum necessary to limit the impact of any successful injection. Monitor logs for unusual database queries or failed injection attempts to detect potential exploitation attempts early. Network segmentation should be enforced to isolate the banking application servers from other critical infrastructure. Additionally, organizations should consider conducting penetration testing focused on SQL injection vectors to identify and remediate any other potential injection points. Finally, maintain close communication with the vendor for any forthcoming patches or updates and plan for prompt application once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-14T07:04:07.311Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 689eed33ad5a09ad00682000

Added to database: 8/15/2025, 8:17:55 AM

Last enriched: 8/15/2025, 8:33:09 AM

Last updated: 8/22/2025, 12:34:57 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats