CVE-2025-9700: SQL Injection in SourceCodester Online Book Store
A flaw has been found in SourceCodester Online Book Store 1.0. This issue affects some unknown processing of the file /publisher_list.php. This manipulation of the argument pubid causes sql injection. It is possible to initiate the attack remotely. The exploit has been published and may be used.
AI Analysis
Technical Summary
CVE-2025-9700 is a SQL Injection vulnerability identified in SourceCodester Online Book Store version 1.0, specifically within the /publisher_list.php file. The vulnerability arises from improper sanitization or validation of the 'pubid' parameter, which is used in SQL queries. An attacker can manipulate this parameter remotely without any authentication or user interaction to inject malicious SQL code. This can lead to unauthorized access to the backend database, allowing attackers to read, modify, or delete data. Given the CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P), the attack is network exploitable with low attack complexity, requires no privileges or user interaction, and can partially impact confidentiality, integrity, and availability. The vulnerability does not affect system components beyond the application scope, but the potential for data leakage or manipulation remains significant. No patches or fixes have been published yet, and while no known exploits are currently observed in the wild, the public availability of exploit code increases the risk of exploitation.
Potential Impact
For European organizations using SourceCodester Online Book Store 1.0, this vulnerability poses a moderate risk. Exploitation could lead to unauthorized disclosure of sensitive customer data, including personal information and transaction records, potentially violating GDPR and other data protection regulations. Data integrity could be compromised, affecting business operations and trustworthiness. Availability impacts are limited but possible if attackers execute destructive SQL commands. The lack of authentication requirement means attackers can target these systems remotely, increasing exposure. Organizations relying on this software for e-commerce or digital content distribution may face reputational damage and financial losses if exploited. Additionally, regulatory fines and legal consequences could arise from data breaches. The medium severity rating suggests that while the threat is serious, it is not critical, but timely remediation is essential to prevent escalation.
Mitigation Recommendations
Organizations should immediately audit their use of SourceCodester Online Book Store 1.0 and identify any instances of the vulnerable /publisher_list.php endpoint. As no official patch is available, applying input validation and parameterized queries or prepared statements to the 'pubid' parameter is critical to prevent SQL injection. Employing web application firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting 'pubid' can provide temporary protection. Regularly monitoring logs for suspicious query patterns and unusual database activity is advised. Organizations should also consider isolating the affected application from sensitive backend systems and databases to limit potential damage. Updating or migrating to a more secure and actively maintained e-commerce platform should be planned. Finally, ensure that backups are current and tested to enable recovery in case of data corruption or loss.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-9700: SQL Injection in SourceCodester Online Book Store
Description
A flaw has been found in SourceCodester Online Book Store 1.0. This issue affects some unknown processing of the file /publisher_list.php. This manipulation of the argument pubid causes sql injection. It is possible to initiate the attack remotely. The exploit has been published and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-9700 is a SQL Injection vulnerability identified in SourceCodester Online Book Store version 1.0, specifically within the /publisher_list.php file. The vulnerability arises from improper sanitization or validation of the 'pubid' parameter, which is used in SQL queries. An attacker can manipulate this parameter remotely without any authentication or user interaction to inject malicious SQL code. This can lead to unauthorized access to the backend database, allowing attackers to read, modify, or delete data. Given the CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P), the attack is network exploitable with low attack complexity, requires no privileges or user interaction, and can partially impact confidentiality, integrity, and availability. The vulnerability does not affect system components beyond the application scope, but the potential for data leakage or manipulation remains significant. No patches or fixes have been published yet, and while no known exploits are currently observed in the wild, the public availability of exploit code increases the risk of exploitation.
Potential Impact
For European organizations using SourceCodester Online Book Store 1.0, this vulnerability poses a moderate risk. Exploitation could lead to unauthorized disclosure of sensitive customer data, including personal information and transaction records, potentially violating GDPR and other data protection regulations. Data integrity could be compromised, affecting business operations and trustworthiness. Availability impacts are limited but possible if attackers execute destructive SQL commands. The lack of authentication requirement means attackers can target these systems remotely, increasing exposure. Organizations relying on this software for e-commerce or digital content distribution may face reputational damage and financial losses if exploited. Additionally, regulatory fines and legal consequences could arise from data breaches. The medium severity rating suggests that while the threat is serious, it is not critical, but timely remediation is essential to prevent escalation.
Mitigation Recommendations
Organizations should immediately audit their use of SourceCodester Online Book Store 1.0 and identify any instances of the vulnerable /publisher_list.php endpoint. As no official patch is available, applying input validation and parameterized queries or prepared statements to the 'pubid' parameter is critical to prevent SQL injection. Employing web application firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting 'pubid' can provide temporary protection. Regularly monitoring logs for suspicious query patterns and unusual database activity is advised. Organizations should also consider isolating the affected application from sensitive backend systems and databases to limit potential damage. Updating or migrating to a more secure and actively maintained e-commerce platform should be planned. Finally, ensure that backups are current and tested to enable recovery in case of data corruption or loss.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-29T15:51:19.399Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68b33940ad5a09ad00905df5
Added to database: 8/30/2025, 5:47:44 PM
Last enriched: 8/30/2025, 6:02:46 PM
Last updated: 8/31/2025, 3:38:57 AM
Views: 10
Related Threats
CVE-2025-9739: SQL Injection in Campcodes Online Water Billing System
MediumCVE-2025-9738: Cross Site Scripting in Portabilis i-Educar
MediumCVE-2025-9737: Cross Site Scripting in O2OA
MediumCVE-2025-9736: Cross Site Scripting in O2OA
MediumCVE-2025-9735: Cross Site Scripting in O2OA
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.