Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9953: CWE-566 Authorization Bypass Through User-Controlled SQL Primary Key in DATABASE Software Training Consulting Ltd. Databank Accreditation Software

0
Critical
VulnerabilityCVE-2025-9953cvecve-2025-9953cwe-566
Published: Thu Feb 19 2026 (02/19/2026, 11:55:10 UTC)
Source: CVE Database V5
Vendor/Project: DATABASE Software Training Consulting Ltd.
Product: Databank Accreditation Software

Description

Authorization Bypass Through User-Controlled SQL Primary Key vulnerability in DATABASE Software Training Consulting Ltd. Databank Accreditation Software allows SQL Injection.This issue affects Databank Accreditation Software: through 19022026. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 02/19/2026, 12:19:05 UTC

Technical Analysis

CVE-2025-9953 is a critical security vulnerability classified under CWE-566 (Authorization Bypass Through User-Controlled SQL Primary Key) affecting the Databank Accreditation Software developed by DATABASE Software Training Consulting Ltd. The vulnerability arises because the software improperly authorizes access to database records based on a user-controlled SQL primary key parameter. This flaw enables an attacker to manipulate the primary key input to perform SQL Injection attacks, bypassing authorization controls entirely. Exploitation does not require any authentication or user interaction, making it remotely exploitable over the network with low complexity. The SQL Injection can lead to unauthorized data access, modification, or deletion, compromising confidentiality, integrity, and availability of the system. The affected versions include all versions up to 19022026, with no patches currently available as the vendor has not responded to disclosure attempts. The CVSS v3.1 base score is 9.8, reflecting the critical nature of this vulnerability with network attack vector, no privileges required, no user interaction, and high impact on all security properties. Although no known exploits are currently reported in the wild, the vulnerability's characteristics make it a prime target for attackers. Organizations using this software, especially in sensitive environments such as accreditation and certification management, face severe risks from potential data breaches and operational disruptions.

Potential Impact

The impact of CVE-2025-9953 is severe and wide-ranging. Successful exploitation allows attackers to bypass authorization mechanisms and execute arbitrary SQL commands on the backend database. This can lead to unauthorized disclosure of sensitive accreditation data, modification or deletion of critical records, and potential full system compromise. The integrity of accreditation results and certifications could be undermined, damaging organizational reputation and trust. Availability may also be affected if attackers delete or corrupt essential data or disrupt database operations. Given the software's role in managing accreditation, compromised systems could affect regulatory compliance and operational continuity. The lack of vendor response and patches increases the window of exposure, elevating risk levels for organizations worldwide. Attackers can exploit this vulnerability remotely without credentials or user interaction, increasing the likelihood of widespread attacks. The critical CVSS score of 9.8 underscores the potential for devastating consequences if unmitigated.

Mitigation Recommendations

1. Immediate network-level controls: Restrict access to the Databank Accreditation Software database and management interfaces to trusted IP addresses only, using firewalls and VPNs. 2. Implement Web Application Firewalls (WAFs) with rules designed to detect and block SQL Injection attempts targeting primary key parameters. 3. Conduct thorough input validation and sanitization on all user-supplied inputs, especially those controlling database keys, to prevent injection attacks. 4. Employ parameterized queries or prepared statements in the application code to eliminate direct concatenation of user inputs into SQL commands. 5. Monitor database logs and application logs for unusual queries or access patterns indicative of exploitation attempts. 6. Isolate the affected software environment to limit lateral movement in case of compromise. 7. Develop and test incident response plans specific to database compromise scenarios. 8. Engage with the vendor for updates or patches and consider alternative software solutions if remediation is delayed. 9. Regularly back up critical accreditation data and verify backup integrity to enable recovery from data corruption or deletion. 10. Educate system administrators and security teams about this vulnerability and ensure heightened vigilance until patches are available.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
TR-CERT
Date Reserved
2025-09-03T14:01:06.488Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6996fd118fb9188dea8e12c9

Added to database: 2/19/2026, 12:07:45 PM

Last enriched: 2/19/2026, 12:19:05 PM

Last updated: 2/21/2026, 12:18:13 AM

Views: 37

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats