Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9953: CWE-566 Authorization Bypass Through User-Controlled SQL Primary Key in DATABASE Software Training Consulting Ltd. Databank Accreditation Software

0
Critical
VulnerabilityCVE-2025-9953cvecve-2025-9953cwe-566
Published: Thu Feb 19 2026 (02/19/2026, 11:55:10 UTC)
Source: CVE Database V5
Vendor/Project: DATABASE Software Training Consulting Ltd.
Product: Databank Accreditation Software

Description

Authorization Bypass Through User-Controlled SQL Primary Key vulnerability in DATABASE Software Training Consulting Ltd. Databank Accreditation Software allows SQL Injection.This issue affects Databank Accreditation Software: through 19022026. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/26/2026, 00:28:04 UTC

Technical Analysis

CVE-2025-9953 is a critical security vulnerability classified under CWE-566, which involves authorization bypass through a user-controlled SQL primary key in the Databank Accreditation Software developed by DATABASE Software Training Consulting Ltd. This vulnerability enables an attacker to perform SQL injection attacks by manipulating the primary key parameter, which is insufficiently validated or sanitized. The flaw allows unauthorized users to bypass authorization controls, accessing or modifying sensitive data without proper permissions. The vulnerability affects the software version identified as '0' through the date 19022026, indicating a broad impact on existing deployments. The CVSS 3.1 base score of 9.8 highlights the vulnerability's critical nature, with attack vector being network-based (AV:N), no privileges required (PR:N), no user interaction needed (UI:N), and full impact on confidentiality, integrity, and availability (C:H/I:H/A:H). The vendor was contacted early but did not respond, and no patches or mitigations have been released, increasing the risk of exploitation. Although no known exploits are currently in the wild, the ease of exploitation and severity suggest that attackers could develop exploits rapidly. The vulnerability poses a significant threat to organizations relying on this software for accreditation data management, potentially leading to data breaches, unauthorized data manipulation, and operational disruption.

Potential Impact

The impact of CVE-2025-9953 is severe for organizations worldwide using the Databank Accreditation Software. Exploitation can lead to complete compromise of sensitive accreditation data, including unauthorized access to confidential information, data tampering, and deletion. This can undermine the integrity of accreditation processes, damage organizational reputation, and result in regulatory penalties. The availability of the system can also be affected, causing service outages and operational disruptions. Since the vulnerability requires no authentication or user interaction and can be exploited remotely, it significantly increases the attack surface. Organizations in sectors relying heavily on accreditation data, such as education, certification bodies, and regulatory agencies, face heightened risks. The lack of vendor response and absence of patches exacerbate the threat, leaving systems exposed to potential attacks. The vulnerability could also be leveraged as a foothold for further network compromise or lateral movement within affected environments.

Mitigation Recommendations

Given the absence of official patches, organizations must implement immediate compensating controls. First, restrict network access to the Databank Accreditation Software to trusted IP addresses and internal networks only, using firewalls and network segmentation. Second, implement strict input validation and parameterized queries at the application or database proxy level to prevent SQL injection attempts. Third, deploy Web Application Firewalls (WAFs) with custom rules to detect and block suspicious SQL injection patterns targeting primary key parameters. Fourth, enable detailed logging and continuous monitoring of database queries and application logs to detect anomalous activities indicative of exploitation attempts. Fifth, conduct regular security assessments and penetration testing focused on this vulnerability. Finally, prepare an incident response plan specific to potential exploitation scenarios and maintain backups of critical data to enable recovery. Organizations should also actively seek vendor updates or community patches and consider alternative software solutions if remediation is delayed.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
TR-CERT
Date Reserved
2025-09-03T14:01:06.488Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6996fd118fb9188dea8e12c9

Added to database: 2/19/2026, 12:07:45 PM

Last enriched: 3/26/2026, 12:28:04 AM

Last updated: 4/6/2026, 8:29:53 PM

Views: 148

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses