CVE-2025-9305: SQL Injection in SourceCodester Online Bank Management System
A security vulnerability has been detected in SourceCodester Online Bank Management System 1.0. The affected element is an unknown function of the file /bank/mnotice.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used.
AI Analysis
Technical Summary
CVE-2025-9305 is a SQL Injection vulnerability identified in version 1.0 of the SourceCodester Online Bank Management System, specifically within an unspecified function in the /bank/mnotice.php file. The vulnerability arises due to improper sanitization or validation of the 'ID' parameter, which can be manipulated remotely without any authentication or user interaction. This allows an attacker to inject malicious SQL queries directly into the backend database. Exploitation of this flaw can lead to unauthorized data access, modification, or deletion, potentially compromising the confidentiality, integrity, and availability of sensitive banking data. The vulnerability has a CVSS 4.0 base score of 6.9, indicating a medium severity level. The attack vector is network-based (remote), requires no privileges or user interaction, and the exploitability is rated as partially functional (E:P). Although no public exploits are currently known in the wild, the public disclosure of the vulnerability increases the risk of exploitation. The lack of available patches or mitigations from the vendor at this time further elevates the threat. Given the critical nature of banking systems, even a medium severity SQL injection can have significant consequences if leveraged by attackers to access customer financial data or disrupt banking operations.
Potential Impact
For European organizations using the SourceCodester Online Bank Management System 1.0, this vulnerability poses a substantial risk. Successful exploitation could lead to unauthorized disclosure of sensitive customer financial information, manipulation of transaction records, or disruption of banking services. This could result in financial losses, regulatory penalties under GDPR due to data breaches, and reputational damage. The remote and unauthenticated nature of the attack increases the likelihood of exploitation, especially if the system is exposed to the internet. Given the critical role of banking infrastructure in Europe’s economy, any compromise could have cascading effects on trust and operational continuity. Furthermore, attackers could leverage this vulnerability as a foothold for further lateral movement within the affected organizations’ networks.
Mitigation Recommendations
Organizations should immediately audit their deployment of SourceCodester Online Bank Management System version 1.0 to identify affected instances. As no official patches are currently available, it is critical to implement compensating controls such as: 1) Employing Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the 'ID' parameter in /bank/mnotice.php; 2) Restricting external access to the affected application or segmenting the network to limit exposure; 3) Conducting thorough input validation and sanitization on all user-supplied parameters, especially 'ID', within the application code if source code access and modifications are possible; 4) Monitoring logs for suspicious database query patterns or repeated failed attempts indicative of injection attempts; 5) Planning for an urgent update or migration to a patched version once available from the vendor; 6) Educating security teams to prioritize this vulnerability in their threat detection and incident response workflows.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium
CVE-2025-9305: SQL Injection in SourceCodester Online Bank Management System
Description
A security vulnerability has been detected in SourceCodester Online Bank Management System 1.0. The affected element is an unknown function of the file /bank/mnotice.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-9305 is a SQL Injection vulnerability identified in version 1.0 of the SourceCodester Online Bank Management System, specifically within an unspecified function in the /bank/mnotice.php file. The vulnerability arises due to improper sanitization or validation of the 'ID' parameter, which can be manipulated remotely without any authentication or user interaction. This allows an attacker to inject malicious SQL queries directly into the backend database. Exploitation of this flaw can lead to unauthorized data access, modification, or deletion, potentially compromising the confidentiality, integrity, and availability of sensitive banking data. The vulnerability has a CVSS 4.0 base score of 6.9, indicating a medium severity level. The attack vector is network-based (remote), requires no privileges or user interaction, and the exploitability is rated as partially functional (E:P). Although no public exploits are currently known in the wild, the public disclosure of the vulnerability increases the risk of exploitation. The lack of available patches or mitigations from the vendor at this time further elevates the threat. Given the critical nature of banking systems, even a medium severity SQL injection can have significant consequences if leveraged by attackers to access customer financial data or disrupt banking operations.
Potential Impact
For European organizations using the SourceCodester Online Bank Management System 1.0, this vulnerability poses a substantial risk. Successful exploitation could lead to unauthorized disclosure of sensitive customer financial information, manipulation of transaction records, or disruption of banking services. This could result in financial losses, regulatory penalties under GDPR due to data breaches, and reputational damage. The remote and unauthenticated nature of the attack increases the likelihood of exploitation, especially if the system is exposed to the internet. Given the critical role of banking infrastructure in Europe’s economy, any compromise could have cascading effects on trust and operational continuity. Furthermore, attackers could leverage this vulnerability as a foothold for further lateral movement within the affected organizations’ networks.
Mitigation Recommendations
Organizations should immediately audit their deployment of SourceCodester Online Bank Management System version 1.0 to identify affected instances. As no official patches are currently available, it is critical to implement compensating controls such as: 1) Employing Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the 'ID' parameter in /bank/mnotice.php; 2) Restricting external access to the affected application or segmenting the network to limit exposure; 3) Conducting thorough input validation and sanitization on all user-supplied parameters, especially 'ID', within the application code if source code access and modifications are possible; 4) Monitoring logs for suspicious database query patterns or repeated failed attempts indicative of injection attempts; 5) Planning for an urgent update or migration to a patched version once available from the vendor; 6) Educating security teams to prioritize this vulnerability in their threat detection and incident response workflows.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-21T05:33:59.635Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68a7389bad5a09ad00121fcb
Added to database: 8/21/2025, 3:17:47 PM
Last enriched: 8/21/2025, 3:33:06 PM
Last updated: 8/21/2025, 4:02:47 PM
Views: 2
Related Threats
CVE-2025-9310: Hard-coded Credentials in yeqifu carRental
MediumCVE-2025-9309: Hard-coded Credentials in Tenda AC10
LowCVE-2025-57761: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in LabRedesCefetRJ WeGIA
CriticalCVE-2025-43755: CWE-79: Cross-site Scripting in Liferay Portal
MediumCVE-2025-57755: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in musistudio claude-code-router
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.