Skip to main content

CVE-2025-9689: SQL Injection in SourceCodester Advanced School Management System

Medium
VulnerabilityCVE-2025-9689cvecve-2025-9689
Published: Sat Aug 30 2025 (08/30/2025, 13:02:07 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: Advanced School Management System

Description

A vulnerability was detected in SourceCodester Advanced School Management System 1.0. The impacted element is an unknown function of the file /index.php/stock/item_select. The manipulation of the argument q results in sql injection. It is possible to launch the attack remotely. The exploit is now public and may be used.

AI-Powered Analysis

AILast updated: 08/30/2025, 13:32:42 UTC

Technical Analysis

CVE-2025-9689 is a SQL Injection vulnerability identified in SourceCodester Advanced School Management System version 1.0. The vulnerability resides in an unspecified function within the /index.php/stock/item_select endpoint, where the input parameter 'q' is improperly sanitized, allowing an attacker to inject malicious SQL code. This flaw enables remote exploitation without requiring user interaction or authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The vulnerability has a CVSS 4.0 base score of 5.3, categorized as medium severity. The injection could lead to unauthorized data access, modification, or deletion within the backend database, potentially compromising confidentiality, integrity, and availability of the system's data. The exploit code is publicly available, increasing the risk of exploitation, although no active exploitation in the wild has been reported yet. The vulnerability affects only version 1.0 of the product, which is a school management system designed to handle academic and administrative data for educational institutions.

Potential Impact

For European organizations, particularly educational institutions using SourceCodester Advanced School Management System 1.0, this vulnerability poses a significant risk. Successful exploitation could lead to unauthorized disclosure of sensitive student, staff, and administrative data, including personal information and academic records. Data integrity could also be compromised, affecting the reliability of school management operations. Availability might be impacted if attackers manipulate or delete critical data, disrupting educational services. Given the public availability of exploit code, the risk of automated or opportunistic attacks is elevated. The medium severity rating reflects moderate impact, but the lack of authentication requirement and ease of remote exploitation increase the urgency for mitigation. Institutions in Europe must consider compliance with GDPR, as data breaches involving personal data could lead to regulatory penalties and reputational damage.

Mitigation Recommendations

Specific mitigation steps include: 1) Immediate upgrade or patching of the SourceCodester Advanced School Management System to a version where this vulnerability is fixed; if no official patch exists, apply custom input validation and parameterized queries to sanitize the 'q' parameter in /index.php/stock/item_select. 2) Implement Web Application Firewall (WAF) rules to detect and block SQL injection patterns targeting this endpoint. 3) Conduct thorough code reviews and security testing focusing on input validation and database query construction. 4) Restrict database user privileges to the minimum necessary to limit the impact of a successful injection. 5) Monitor logs for suspicious queries or access patterns related to the vulnerable endpoint. 6) Educate IT staff and administrators about the vulnerability and the importance of timely updates. 7) If possible, isolate the school management system network segment to reduce exposure. These measures go beyond generic advice by focusing on the specific vulnerable endpoint and the nature of the injection vector.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-29T11:04:44.765Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68b2f9fcad5a09ad008706ad

Added to database: 8/30/2025, 1:17:48 PM

Last enriched: 8/30/2025, 1:32:42 PM

Last updated: 8/30/2025, 3:34:26 PM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats