Skip to main content

CVE-2025-9473: SQL Injection in SourceCodester Online Bank Management System

Medium
VulnerabilityCVE-2025-9473cvecve-2025-9473
Published: Tue Aug 26 2025 (08/26/2025, 05:02:07 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: Online Bank Management System

Description

A security vulnerability has been detected in SourceCodester Online Bank Management System 1.0. This impacts an unknown function of the file /feedback.php. The manipulation of the argument msg leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used.

AI-Powered Analysis

AILast updated: 08/26/2025, 05:33:07 UTC

Technical Analysis

CVE-2025-9473 is a SQL Injection vulnerability identified in version 1.0 of the SourceCodester Online Bank Management System, specifically within the /feedback.php file. The vulnerability arises from improper sanitization or validation of the 'msg' parameter, which is susceptible to malicious SQL payloads. An attacker can remotely exploit this flaw without requiring authentication or user interaction, by directly manipulating the 'msg' argument in HTTP requests. Successful exploitation could allow the attacker to execute arbitrary SQL commands against the backend database, potentially leading to unauthorized data access, data modification, or even complete compromise of the database server. The CVSS 4.0 base score of 6.9 classifies this vulnerability as medium severity, reflecting its network attack vector, low attack complexity, and no requirement for privileges or user interaction. However, the impact on confidentiality, integrity, and availability is rated as low individually, indicating limited but non-negligible damage potential. No known exploits are currently in the wild, but public disclosure increases the risk of exploitation attempts. The lack of available patches or vendor advisories at this time means affected organizations must rely on mitigation strategies until an official fix is released.

Potential Impact

For European organizations using the SourceCodester Online Bank Management System 1.0, this vulnerability poses a significant risk to the security of sensitive financial data and customer feedback information. Exploitation could lead to unauthorized disclosure of confidential banking information, manipulation of feedback data, or disruption of banking operations. Given the critical nature of banking systems, even a medium-severity vulnerability can have outsized reputational and regulatory consequences, especially under stringent EU data protection laws such as GDPR. Financial institutions may face legal liabilities and loss of customer trust if breaches occur. Additionally, attackers could leverage this vulnerability as a foothold for further lateral movement within the network, potentially escalating to more damaging attacks. The remote and unauthenticated nature of the exploit increases the attack surface, making it accessible to a broad range of threat actors, including cybercriminals and hacktivists targeting European financial entities.

Mitigation Recommendations

1. Immediate implementation of input validation and parameterized queries or prepared statements in the /feedback.php script to sanitize the 'msg' parameter and prevent SQL injection. 2. Deploy Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'msg' parameter. 3. Conduct thorough code reviews and security testing of all user input handling components within the Online Bank Management System. 4. Monitor web server logs for unusual or suspicious requests containing SQL injection payloads targeting the feedback functionality. 5. Isolate the database server with strict network segmentation to limit potential lateral movement in case of exploitation. 6. Engage with the vendor or community to obtain or request official patches or updates addressing this vulnerability. 7. Prepare incident response plans specific to database compromise scenarios and ensure backups are up to date and tested for restoration. 8. Consider temporary disabling or restricting access to the feedback feature if feasible until a patch is applied.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-25T15:03:58.654Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ad4377ad5a09ad00554c31

Added to database: 8/26/2025, 5:17:43 AM

Last enriched: 8/26/2025, 5:33:07 AM

Last updated: 8/26/2025, 6:20:23 AM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats