Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9690: SQL Injection in SourceCodester Advanced School Management System

0
Medium
VulnerabilityCVE-2025-9690cvecve-2025-9690
Published: Sat Aug 30 2025 (08/30/2025, 13:32:07 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: Advanced School Management System

Description

A flaw has been found in SourceCodester Advanced School Management System 1.0. This affects an unknown function of the file /index.php/stock/vendordetails. This manipulation of the argument ID causes sql injection. The attack can be initiated remotely. The exploit has been published and may be used.

AI-Powered Analysis

AILast updated: 09/07/2025, 00:39:22 UTC

Technical Analysis

CVE-2025-9690 is a SQL Injection vulnerability identified in SourceCodester Advanced School Management System version 1.0. The flaw exists in an unspecified function within the /index.php/stock/vendordetails endpoint, where the 'ID' parameter is improperly sanitized, allowing an attacker to inject malicious SQL code. This vulnerability can be exploited remotely without requiring user interaction or authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The vulnerability impacts the confidentiality, integrity, and availability of the underlying database, potentially allowing attackers to extract sensitive data, modify or delete records, or disrupt system operations. The CVSS 4.0 base score is 5.3, reflecting a medium severity level, with partial impact on confidentiality, integrity, and availability. Although no known exploits are currently observed in the wild, a public exploit has been published, increasing the risk of exploitation. The vulnerability is specific to version 1.0 of the product, and no official patches or updates have been linked yet. Given the nature of the product—a school management system—compromise could expose student, staff, and administrative data, leading to privacy violations and operational disruptions.

Potential Impact

For European organizations, particularly educational institutions using SourceCodester Advanced School Management System 1.0, this vulnerability poses a significant risk to sensitive personal data, including student records, staff information, and potentially financial data related to school operations. Exploitation could lead to unauthorized data disclosure, data tampering, or denial of service, impacting the confidentiality, integrity, and availability of critical educational services. Such incidents could also result in non-compliance with GDPR regulations due to exposure of personal data, leading to legal and financial penalties. Additionally, disruption of school management systems could affect administrative workflows and educational delivery, causing reputational damage and operational challenges. The medium severity rating suggests that while the vulnerability is not critical, the ease of remote exploitation without user interaction or authentication makes it a credible threat that should be addressed promptly.

Mitigation Recommendations

Given the absence of an official patch, European organizations should implement immediate compensating controls. These include: 1) Applying strict input validation and sanitization on the 'ID' parameter at the web application firewall (WAF) level to block SQL injection payloads targeting the /index.php/stock/vendordetails endpoint. 2) Restricting access to the vulnerable endpoint through network segmentation or IP whitelisting where feasible. 3) Monitoring web server and database logs for unusual queries or error messages indicative of SQL injection attempts. 4) Conducting a thorough code review and applying manual fixes to sanitize inputs if source code access is available. 5) Planning for an upgrade or migration to a patched or alternative school management system version once available. 6) Educating IT staff about this vulnerability and ensuring incident response plans are updated to detect and respond to exploitation attempts. These targeted measures go beyond generic advice by focusing on the specific vulnerable component and attack vector.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-29T11:04:47.123Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68b30104ad5a09ad008a167e

Added to database: 8/30/2025, 1:47:48 PM

Last enriched: 9/7/2025, 12:39:22 AM

Last updated: 10/15/2025, 4:18:07 AM

Views: 50

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats