Skip to main content

CVE-2025-9690: SQL Injection in SourceCodester Advanced School Management System

Medium
VulnerabilityCVE-2025-9690cvecve-2025-9690
Published: Sat Aug 30 2025 (08/30/2025, 13:32:07 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: Advanced School Management System

Description

A flaw has been found in SourceCodester Advanced School Management System 1.0. This affects an unknown function of the file /index.php/stock/vendordetails. This manipulation of the argument ID causes sql injection. The attack can be initiated remotely. The exploit has been published and may be used.

AI-Powered Analysis

AILast updated: 08/30/2025, 14:02:46 UTC

Technical Analysis

CVE-2025-9690 is a medium-severity SQL Injection vulnerability identified in SourceCodester Advanced School Management System version 1.0. The flaw exists in an unspecified function within the /index.php/stock/vendordetails file, where the 'ID' parameter is improperly sanitized, allowing an attacker to inject malicious SQL code. This vulnerability can be exploited remotely without requiring user interaction or authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The injection could lead to unauthorized access or manipulation of the backend database, potentially compromising confidentiality, integrity, and availability of the system's data. Although the CVSS score is moderate at 5.3, the presence of an exploit published publicly increases the risk of exploitation. The vulnerability affects only version 1.0 of the product, and no official patches or fixes have been linked or published yet. The attack vector is network-based with low attack complexity, and the vulnerability impacts the system's data confidentiality, integrity, and availability to a limited extent, as indicated by the CVSS vector components VC:L, VI:L, and VA:L. No known exploits in the wild have been reported at the time of publication, but the availability of exploit code raises the likelihood of future attacks.

Potential Impact

For European organizations using SourceCodester Advanced School Management System 1.0, this vulnerability poses a tangible risk to the security of sensitive school management data, including student records, financial data, and vendor information. Successful exploitation could lead to unauthorized data disclosure, data tampering, or disruption of school administrative operations. Given that the system is used in educational environments, the impact extends to privacy concerns under GDPR, as personal data could be exposed or altered. The medium severity suggests that while the vulnerability is not critical, it still requires prompt attention to prevent potential data breaches or operational disruptions. The remote exploitability without user interaction increases the risk, especially for organizations with internet-facing deployments of this system. The lack of available patches means organizations must rely on mitigation strategies until an official fix is released. The impact on availability, though limited, could affect the continuity of school management services, which may disrupt educational activities and administrative workflows.

Mitigation Recommendations

European organizations should immediately conduct an inventory to identify any deployments of SourceCodester Advanced School Management System version 1.0. Until an official patch is released, organizations should implement the following mitigations: 1) Restrict network access to the vulnerable endpoint (/index.php/stock/vendordetails) by applying firewall rules or web application firewall (WAF) policies to block or monitor suspicious SQL injection patterns. 2) Employ input validation and sanitization at the web server or application gateway level to filter out malicious SQL payloads targeting the 'ID' parameter. 3) Monitor logs for unusual database queries or error messages indicative of SQL injection attempts. 4) Consider deploying runtime application self-protection (RASP) tools if available to detect and block injection attacks in real time. 5) Isolate the affected system from the internet or limit access to trusted internal networks until a patch is available. 6) Engage with the vendor or community to obtain updates or patches as soon as they are released. 7) Educate IT staff about this vulnerability and the importance of timely response to reduce exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-29T11:04:47.123Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68b30104ad5a09ad008a167e

Added to database: 8/30/2025, 1:47:48 PM

Last enriched: 8/30/2025, 2:02:46 PM

Last updated: 8/30/2025, 3:36:10 PM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats