Skip to main content

CVE-2025-9700: SQL Injection in SourceCodester Online Book Store

Medium
VulnerabilityCVE-2025-9700cvecve-2025-9700
Published: Sat Aug 30 2025 (08/30/2025, 17:32:07 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: Online Book Store

Description

A flaw has been found in SourceCodester Online Book Store 1.0. This issue affects some unknown processing of the file /publisher_list.php. This manipulation of the argument pubid causes sql injection. It is possible to initiate the attack remotely. The exploit has been published and may be used.

AI-Powered Analysis

AILast updated: 08/30/2025, 18:02:46 UTC

Technical Analysis

CVE-2025-9700 is a SQL Injection vulnerability identified in SourceCodester Online Book Store version 1.0, specifically within the /publisher_list.php file. The vulnerability arises from improper sanitization or validation of the 'pubid' parameter, which is used in SQL queries. An attacker can manipulate this parameter remotely without any authentication or user interaction to inject malicious SQL code. This can lead to unauthorized access to the backend database, allowing attackers to read, modify, or delete data. Given the CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P), the attack is network exploitable with low attack complexity, requires no privileges or user interaction, and can partially impact confidentiality, integrity, and availability. The vulnerability does not affect system components beyond the application scope, but the potential for data leakage or manipulation remains significant. No patches or fixes have been published yet, and while no known exploits are currently observed in the wild, the public availability of exploit code increases the risk of exploitation.

Potential Impact

For European organizations using SourceCodester Online Book Store 1.0, this vulnerability poses a moderate risk. Exploitation could lead to unauthorized disclosure of sensitive customer data, including personal information and transaction records, potentially violating GDPR and other data protection regulations. Data integrity could be compromised, affecting business operations and trustworthiness. Availability impacts are limited but possible if attackers execute destructive SQL commands. The lack of authentication requirement means attackers can target these systems remotely, increasing exposure. Organizations relying on this software for e-commerce or digital content distribution may face reputational damage and financial losses if exploited. Additionally, regulatory fines and legal consequences could arise from data breaches. The medium severity rating suggests that while the threat is serious, it is not critical, but timely remediation is essential to prevent escalation.

Mitigation Recommendations

Organizations should immediately audit their use of SourceCodester Online Book Store 1.0 and identify any instances of the vulnerable /publisher_list.php endpoint. As no official patch is available, applying input validation and parameterized queries or prepared statements to the 'pubid' parameter is critical to prevent SQL injection. Employing web application firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting 'pubid' can provide temporary protection. Regularly monitoring logs for suspicious query patterns and unusual database activity is advised. Organizations should also consider isolating the affected application from sensitive backend systems and databases to limit potential damage. Updating or migrating to a more secure and actively maintained e-commerce platform should be planned. Finally, ensure that backups are current and tested to enable recovery in case of data corruption or loss.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-29T15:51:19.399Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68b33940ad5a09ad00905df5

Added to database: 8/30/2025, 5:47:44 PM

Last enriched: 8/30/2025, 6:02:46 PM

Last updated: 8/31/2025, 3:38:57 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats