CVE Alert: CVE-2025-10973 – JackieDYH – Resume-management-system

CVE-2025-10973

HIGHNo exploitation known

A flaw has been found in JackieDYH Resume-management-system up to fb6b857d852dd796e748ce30c606fe5e61c18273. Affected by this issue is some unknown functionality of the file /admin/show.php. This manipulation of the argument userid causes sql injection. The attack may be initiated remotely. The exploit has been published and may be used. This product uses a rolling release model to deliver continuous updates. As a result, specific version information for affected or updated releases is not available. The vendor was contacted early about this disclosure but did not respond in any way.

CVSS v3.1 (7.3)
Vendor
JackieDYH
Product
Resume-management-system
Versions
fb6b857d852dd796e748ce30c606fe5e61c18273
CWE
CWE-89, SQL Injection
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Published
2025-09-25T21:02:05.564Z
Updated
2025-09-25T21:02:05.564Z

AI Summary Analysis

Risk verdict

High risk: remote, unauthenticated SQL injection with a publicly disclosed exploit increases likelihood of abuse.

Why this matters

If exploited, attacker could read or alter data via the web app without user interaction, potentially exposing PII or sensitive records. The vendor’s rolling-release model complicates timely patching, raising the window for exploitation and data compromise.

Most likely attack path

An attacker targets the /admin/show.php endpoint, supplying a crafted userid parameter to trigger SQL injection over the network. No authentication or user interaction is required, and the impact is confined to data confidentiality, integrity, and availability at the app/DB layer; successful abuse can enable data exfiltration or tampering.

Who is most exposed

Web deployments of JackieDYH Resume-management-system with internet-facing admin interfaces are at risk, especially where the application runs on common LAMP/WEB stacks and is not tightly network-segmented.

Detection ideas

  • Inspect application logs for abnormal userid parameters and SQL error messages from /admin/show.php.
  • Monitor for unusual query patterns and high-volume data exfiltration indicators from the database.
  • Look for automated probes targeting the admin endpoint and potential SQLi payloads in GET parameters.
  • Enable WAF/IDS rules tuned to SQL injection payloads against PHP backends.
  • Correlate spikes in authentication- or admin-related requests with anomalous database responses.

Mitigation and prioritisation

  • Apply vendor patch or upgrade to a fixed release; if only rolling updates are available, prioritise hotfix deployment.
  • Implement input validation and parameterised queries; disable or sanitise untrusted userid input.
  • Restrict access to /admin/show.php to trusted networks or authenticated admins; enforce MFA where feasible.
  • Enhance logging, alerting, and incident response Playbooks; test backups and recovery.
  • If KEV is confirmed or EPSS ≥ 0.5 (data not provided here), treat as priority 1. If not, prioritise promptly but align with patch availability and exposure. Note: state of KEV/EPSS/SSVC exploitation is unknown.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.