Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9699: SQL Injection in SourceCodester Online Polling System Code

0
Medium
VulnerabilityCVE-2025-9699cvecve-2025-9699
Published: Sat Aug 30 2025 (08/30/2025, 16:32:06 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: Online Polling System Code

Description

A vulnerability was detected in SourceCodester Online Polling System Code 1.0. This vulnerability affects unknown code of the file /admin/checklogin.php. The manipulation of the argument myusername results in sql injection. The attack may be performed from a remote location. The exploit is now public and may be used.

AI-Powered Analysis

AILast updated: 09/07/2025, 00:40:26 UTC

Technical Analysis

CVE-2025-9699 is a SQL Injection vulnerability identified in SourceCodester Online Polling System Code version 1.0. The vulnerability exists in the /admin/checklogin.php file, specifically in the handling of the 'myusername' parameter. An attacker can manipulate this parameter to inject malicious SQL code, potentially allowing unauthorized access or data manipulation within the backend database. The vulnerability is remotely exploitable without requiring authentication or user interaction, increasing its risk profile. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the ease of exploitation (network attack vector, low attack complexity) and the potential impact on confidentiality, integrity, and availability, albeit with limited scope and impact. The vulnerability does not require privileges or user interaction, and the attack can be performed over the network. Although no public exploits are currently known in the wild, the exploit code has been made public, increasing the likelihood of exploitation. The vulnerability affects only version 1.0 of the product, which is an online polling system used to conduct surveys or polls, typically involving user authentication and data storage. The SQL Injection could allow attackers to bypass authentication, extract sensitive data, or modify poll results, undermining the integrity and trustworthiness of the polling system.

Potential Impact

For European organizations using SourceCodester Online Polling System Code 1.0, this vulnerability poses a significant risk to the confidentiality and integrity of polling data. Exploitation could lead to unauthorized access to administrative functions, manipulation of poll results, or exposure of sensitive user information. This could damage organizational reputation, especially for entities relying on polling data for decision-making or public opinion analysis. Additionally, if the polling system is integrated into broader IT infrastructure, attackers might leverage this vulnerability as a foothold for lateral movement or further attacks. Given the remote exploitability and lack of required authentication, attackers can target these systems at scale. The impact is particularly relevant for public sector organizations, political parties, market research firms, and any European entities conducting online polls or surveys. Disruption or manipulation of polling data could have broader societal implications, including misinformation or skewed public perception.

Mitigation Recommendations

Organizations should immediately assess their use of SourceCodester Online Polling System Code version 1.0 and plan for an upgrade or patch once available. In the absence of an official patch, mitigations include implementing web application firewalls (WAFs) with rules to detect and block SQL injection attempts targeting the 'myusername' parameter in /admin/checklogin.php. Input validation and parameterized queries should be enforced to sanitize user inputs. Restricting access to the admin interface by IP whitelisting or VPN can reduce exposure. Monitoring logs for suspicious login attempts or unusual query patterns can help detect exploitation attempts. Additionally, isolating the polling system from critical internal networks and applying the principle of least privilege to database accounts can limit potential damage. Regular security audits and penetration testing focused on injection flaws are recommended. Organizations should also educate developers and administrators about secure coding practices to prevent similar vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-29T15:45:36.726Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68b32b33ad5a09ad008baa41

Added to database: 8/30/2025, 4:47:47 PM

Last enriched: 9/7/2025, 12:40:26 AM

Last updated: 10/16/2025, 1:42:07 AM

Views: 47

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats