CVE Alert: CVE-2025-10112 – itsourcecode – Student Information Management System

CVE-2025-10112

HIGHNo exploitation known

A weakness has been identified in itsourcecode Student Information Management System 1.0. The impacted element is an unknown function of the file /admin/modules/department/index.php. This manipulation of the argument ID causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.

CVSS v3.1 (7.3)
Vendor
itsourcecode
Product
Student Information Management System
Versions
1.0
CWE
CWE-89, SQL Injection
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Published
2025-09-08T23:32:06.785Z
Updated
2025-09-08T23:32:06.785Z

AI Summary Analysis

Risk verdict

High risk: remote, unauthenticated SQL injection in a web-based admin module, with a publicly available exploit, making exploitation highly feasible.

Why this matters

The exposed web component can directly reach the backend database, risking data exposure or modification of student records and system integrity. Given the public PoC, opportunistic attackers are likely to attempt automated scans and exploitation, with potential regulatory and reputational impact for affected organisations.

Most likely attack path

Attack traffic would target a network-accessible endpoint (no user interaction required) and use a crafted id parameter to trigger SQL injection. With no privileges required and no UI interaction, an attacker could read or modify data and potentially compromise the application layer or database. Precondition assumptions: AV:N, AC:L, PR:N, UI:N, Scope: Unchanged, indicating straightforward remote access and data confidentiality/integrity impact.

Who is most exposed

Education sector organisations and other institutions deploying public-facing student information systems with internet-exposed admin modules are most at risk, particularly on common web-hosting stacks where injections can reach the DB.

Detection ideas

  • Web server logs show repeated unauthenticated requests with suspicious id values.
  • Database or application logs reveal SQL error messages or unusual queries traced to the vulnerable endpoint.
  • WAF alerts for SQL injection patterns (union/select, tautologies, comment characters).
  • Spike in data access or anomalous data retrieval following specific requests.
  • PoC indicators or exploit strings appearing in network traffic or logs.

Mitigation and prioritisation

  • Apply vendor patch or upgrade to the fixed version; implement vendor advisories.
  • Refactor the affected module to use parameterised queries/prepared statements; enforce secure coding practices.
  • Enable and tune WAF/IDS signatures for SQL injection; add input validation and canonicalisation at the edge.
  • Restrict admin interface exposure (IP allowlists or VPN access); implement MFA where feasible.
  • Review and rotate database credentials; conduct staging tests before production roll-out; enhance monitoring of DB access patterns.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.