CVE Alert: CVE-2025-11434 – itsourcecode – Student Transcript Processing System
CVE-2025-11434
A weakness has been identified in itsourcecode Student Transcript Processing System 1.0. Affected is an unknown function of the file /login.php. Executing manipulation of the argument uname can lead to sql injection. It is possible to launch the attack remotely. The exploit has been made available to the public and could be exploited.
AI Summary Analysis
Risk verdict
Publicly disclosed PoC-enabled remote SQL injection on login.php elevates risk; exploitable without authentication and requires urgent remediation.
Why this matters
Successful exploitation can bypass login, granting access to sensitive student records and grades, with potential data manipulation or exfiltration. The remote, network-facing nature and low attacker effort raise the likelihood of automated scans and mass exploitation, risking regulatory exposure and reputational damage for affected institutions.
Most likely attack path
An attacker submits crafted uname via the login endpoint over the network, triggering an SQL injection that bypasses authentication. With PR:N, UI:N, AC:L, AV:N, the bar for exploitation is low and repeatable, enabling data access or modification without user interaction. Scope is unchanged and impacts to confidentiality, integrity, and availability are low to moderate but could seed broader database abuse or downstream service disruption.
Who is most exposed
Institutions deploying itsourcecode Student Transcript Processing System, especially on publicly accessible web servers or hosted environments, are most at risk. Typical deployments on LAMP/stacked web apps with student-facing portals are likely targets.
Detection ideas
- Surge in unusual login attempts with malformed uname payloads.
- SQL error messages or abnormal database exceptions in app logs.
- Anomalous queries or authentication bypass activity in DB audit logs.
- Web application firewall alerts for suspicious injection patterns.
- Increased latency or failed auth attempts at the login page.
Mitigation and prioritisation
- Apply fixed vendor patch or hotfix; deploy in staging first, then production.
- Enforce parameterised queries/prepared statements and strict input validation.
- Restrict DB accounts to least privilege; disable detailed DB errors; harden login.php error handling.
- Enable network-level access controls and WAF rules targeting SQL injection patterns.
- Implement monitoring for anomalous authentication and query activity; conduct a code review of login logic.
- If KEV true or EPSS ≥ 0.5, treat as priority 1.
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.