CVE-2025-9690: SQL Injection in SourceCodester Advanced School Management System
A flaw has been found in SourceCodester Advanced School Management System 1.0. This affects an unknown function of the file /index.php/stock/vendordetails. This manipulation of the argument ID causes sql injection. The attack can be initiated remotely. The exploit has been published and may be used.
AI Analysis
Technical Summary
CVE-2025-9690 is a medium-severity SQL Injection vulnerability identified in SourceCodester Advanced School Management System version 1.0. The flaw exists in an unspecified function within the /index.php/stock/vendordetails file, where the 'ID' parameter is improperly sanitized, allowing an attacker to inject malicious SQL code. This vulnerability can be exploited remotely without requiring user interaction or authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The injection could lead to unauthorized access or manipulation of the backend database, potentially compromising confidentiality, integrity, and availability of the system's data. Although the CVSS score is moderate at 5.3, the presence of an exploit published publicly increases the risk of exploitation. The vulnerability affects only version 1.0 of the product, and no official patches or fixes have been linked or published yet. The attack vector is network-based with low attack complexity, and the vulnerability impacts the system's data confidentiality, integrity, and availability to a limited extent, as indicated by the CVSS vector components VC:L, VI:L, and VA:L. No known exploits in the wild have been reported at the time of publication, but the availability of exploit code raises the likelihood of future attacks.
Potential Impact
For European organizations using SourceCodester Advanced School Management System 1.0, this vulnerability poses a tangible risk to the security of sensitive school management data, including student records, financial data, and vendor information. Successful exploitation could lead to unauthorized data disclosure, data tampering, or disruption of school administrative operations. Given that the system is used in educational environments, the impact extends to privacy concerns under GDPR, as personal data could be exposed or altered. The medium severity suggests that while the vulnerability is not critical, it still requires prompt attention to prevent potential data breaches or operational disruptions. The remote exploitability without user interaction increases the risk, especially for organizations with internet-facing deployments of this system. The lack of available patches means organizations must rely on mitigation strategies until an official fix is released. The impact on availability, though limited, could affect the continuity of school management services, which may disrupt educational activities and administrative workflows.
Mitigation Recommendations
European organizations should immediately conduct an inventory to identify any deployments of SourceCodester Advanced School Management System version 1.0. Until an official patch is released, organizations should implement the following mitigations: 1) Restrict network access to the vulnerable endpoint (/index.php/stock/vendordetails) by applying firewall rules or web application firewall (WAF) policies to block or monitor suspicious SQL injection patterns. 2) Employ input validation and sanitization at the web server or application gateway level to filter out malicious SQL payloads targeting the 'ID' parameter. 3) Monitor logs for unusual database queries or error messages indicative of SQL injection attempts. 4) Consider deploying runtime application self-protection (RASP) tools if available to detect and block injection attacks in real time. 5) Isolate the affected system from the internet or limit access to trusted internal networks until a patch is available. 6) Engage with the vendor or community to obtain updates or patches as soon as they are released. 7) Educate IT staff about this vulnerability and the importance of timely response to reduce exposure.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-9690: SQL Injection in SourceCodester Advanced School Management System
Description
A flaw has been found in SourceCodester Advanced School Management System 1.0. This affects an unknown function of the file /index.php/stock/vendordetails. This manipulation of the argument ID causes sql injection. The attack can be initiated remotely. The exploit has been published and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-9690 is a medium-severity SQL Injection vulnerability identified in SourceCodester Advanced School Management System version 1.0. The flaw exists in an unspecified function within the /index.php/stock/vendordetails file, where the 'ID' parameter is improperly sanitized, allowing an attacker to inject malicious SQL code. This vulnerability can be exploited remotely without requiring user interaction or authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The injection could lead to unauthorized access or manipulation of the backend database, potentially compromising confidentiality, integrity, and availability of the system's data. Although the CVSS score is moderate at 5.3, the presence of an exploit published publicly increases the risk of exploitation. The vulnerability affects only version 1.0 of the product, and no official patches or fixes have been linked or published yet. The attack vector is network-based with low attack complexity, and the vulnerability impacts the system's data confidentiality, integrity, and availability to a limited extent, as indicated by the CVSS vector components VC:L, VI:L, and VA:L. No known exploits in the wild have been reported at the time of publication, but the availability of exploit code raises the likelihood of future attacks.
Potential Impact
For European organizations using SourceCodester Advanced School Management System 1.0, this vulnerability poses a tangible risk to the security of sensitive school management data, including student records, financial data, and vendor information. Successful exploitation could lead to unauthorized data disclosure, data tampering, or disruption of school administrative operations. Given that the system is used in educational environments, the impact extends to privacy concerns under GDPR, as personal data could be exposed or altered. The medium severity suggests that while the vulnerability is not critical, it still requires prompt attention to prevent potential data breaches or operational disruptions. The remote exploitability without user interaction increases the risk, especially for organizations with internet-facing deployments of this system. The lack of available patches means organizations must rely on mitigation strategies until an official fix is released. The impact on availability, though limited, could affect the continuity of school management services, which may disrupt educational activities and administrative workflows.
Mitigation Recommendations
European organizations should immediately conduct an inventory to identify any deployments of SourceCodester Advanced School Management System version 1.0. Until an official patch is released, organizations should implement the following mitigations: 1) Restrict network access to the vulnerable endpoint (/index.php/stock/vendordetails) by applying firewall rules or web application firewall (WAF) policies to block or monitor suspicious SQL injection patterns. 2) Employ input validation and sanitization at the web server or application gateway level to filter out malicious SQL payloads targeting the 'ID' parameter. 3) Monitor logs for unusual database queries or error messages indicative of SQL injection attempts. 4) Consider deploying runtime application self-protection (RASP) tools if available to detect and block injection attacks in real time. 5) Isolate the affected system from the internet or limit access to trusted internal networks until a patch is available. 6) Engage with the vendor or community to obtain updates or patches as soon as they are released. 7) Educate IT staff about this vulnerability and the importance of timely response to reduce exposure.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-29T11:04:47.123Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68b30104ad5a09ad008a167e
Added to database: 8/30/2025, 1:47:48 PM
Last enriched: 8/30/2025, 2:02:46 PM
Last updated: 8/30/2025, 3:36:10 PM
Views: 4
Related Threats
CVE-2025-6992
UnknownCVE-2025-9706: SQL Injection in SourceCodester Water Billing System
MediumCVE-2025-1391: Improper Access Control
MediumCVE-2025-9705: SQL Injection in SourceCodester Water Billing System
MediumCVE-2025-0750: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.