Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9689: SQL Injection in SourceCodester Advanced School Management System

0
Medium
VulnerabilityCVE-2025-9689cvecve-2025-9689
Published: Sat Aug 30 2025 (08/30/2025, 13:02:07 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: Advanced School Management System

Description

A vulnerability was detected in SourceCodester Advanced School Management System 1.0. The impacted element is an unknown function of the file /index.php/stock/item_select. The manipulation of the argument q results in sql injection. It is possible to launch the attack remotely. The exploit is now public and may be used.

AI-Powered Analysis

AILast updated: 09/07/2025, 00:39:12 UTC

Technical Analysis

CVE-2025-9689 is a SQL Injection vulnerability identified in version 1.0 of the SourceCodester Advanced School Management System, specifically within an unknown function located at /index.php/stock/item_select. The vulnerability arises from improper sanitization or validation of the 'q' parameter, which an attacker can manipulate to inject malicious SQL code. This flaw allows remote attackers to execute arbitrary SQL queries against the backend database without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The vulnerability has a CVSS 4.0 base score of 5.3, categorizing it as medium severity. Although no public exploits are currently observed in the wild, the exploit code has been made publicly available, increasing the risk of exploitation. The vulnerability impacts the confidentiality, integrity, and availability of the affected system's data, as attackers could potentially extract sensitive information, modify or delete records, or disrupt system operations. The scope is limited to installations running version 1.0 of this specific school management system. The vulnerability does not require user interaction but does require low privileges (PR:L), suggesting that an attacker might need some level of access or that the system has weak privilege separation. No patches or fixes have been linked yet, indicating that organizations using this software need to apply mitigations proactively.

Potential Impact

For European organizations, particularly educational institutions using the SourceCodester Advanced School Management System 1.0, this vulnerability poses a significant risk to the confidentiality and integrity of student and staff data, including personal information, academic records, and financial details. Exploitation could lead to unauthorized data disclosure, data tampering, or denial of service, disrupting school operations and potentially violating GDPR regulations due to data breaches. The medium severity score reflects moderate ease of exploitation combined with impactful consequences. Given the remote exploitability and lack of required user interaction, attackers could automate attacks at scale, targeting multiple institutions. This could result in reputational damage, regulatory penalties, and operational downtime. Additionally, since the system is specialized for school management, the impact on availability could hinder critical administrative functions, affecting teaching and learning processes.

Mitigation Recommendations

Organizations should immediately audit their use of the SourceCodester Advanced School Management System to identify any instances of version 1.0 in deployment. Since no official patches are currently available, administrators should consider the following specific mitigations: 1) Implement Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the 'q' parameter in /index.php/stock/item_select. 2) Restrict network access to the management system to trusted IP addresses or VPNs to limit exposure. 3) Conduct input validation and sanitization at the application or proxy level to neutralize malicious input. 4) Monitor logs for unusual query patterns or repeated access attempts to the vulnerable endpoint. 5) If feasible, upgrade to a newer, patched version of the software once available or consider migrating to alternative school management solutions with better security track records. 6) Educate IT staff on the vulnerability and ensure incident response plans include steps for SQL injection attacks. 7) Regularly back up databases and test restoration procedures to minimize data loss in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-29T11:04:44.765Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68b2f9fcad5a09ad008706ad

Added to database: 8/30/2025, 1:17:48 PM

Last enriched: 9/7/2025, 12:39:12 AM

Last updated: 10/15/2025, 4:18:45 AM

Views: 41

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats