CVE Alert: CVE-2025-10111 – itsourcecode – Student Information Management System

CVE-2025-10111

HIGHNo exploitation known

A security flaw has been discovered in itsourcecode Student Information Management System 1.0. The affected element is an unknown function of the file /admin/modules/instructor/index.php. The manipulation of the argument ID results in sql injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited.

CVSS v3.1 (7.3)
Vendor
itsourcecode
Product
Student Information Management System
Versions
1.0
CWE
CWE-89, SQL Injection
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Published
2025-09-08T23:02:08.227Z
Updated
2025-09-08T23:02:08.227Z

AI Summary Analysis

Risk verdict

High risk with remote, unauthenticated SQL injection; PoC exploit publicly available—treat as a priority exposure when KEV/EPSS signals are present.

Why this matters

Attackers can read or modify sensitive records and potentially extend access within the database, risking data loss and regulatory exposure. The vulnerability impacts all data processed by the affected web component, and exploitation can occur without user interaction, enabling rapid “web-to-database” compromise.

Most likely attack path

An attacker sends crafted input to a vulnerable parameter exposed by the web interface, triggering SQL injection. With remote access and no authentication required, the attacker can leverage the flaw to exfiltrate or alter data, subject to the partial-impact constraints (confidentiality/integrity/availability not fully destroyed). The absence of UI interaction and unauthorised access elevates opportunistic exploitation chances.

Who is most exposed

Public-facing deployments of the information system on web servers are at greatest risk, especially where defaults or minimal input sanitisation exist and where administrative endpoints are reachable from the internet.

Detection ideas

  • Unusually verbose SQL error messages in logs or responses.
  • Anomalous requests to the ID parameter or similar input fields.
  • Database query patterns showing UNION/SELECT payloads in web traffic.
  • Increased unsuccessful login or audit events followed by data-access anomalies.
  • WAF alerts for SQL injection signatures targeting admin endpoints.

Mitigation and prioritisation

  • Apply available patch or upgrade to remediate the SQL injection.
  • Implement parameterised queries and strict input validation; rework the affected module to avoid dynamic SQL.
  • Enforce least-privilege DB accounts and disable unnecessary admin exposure; isolate the app server.
  • Deploy network/WAF rules to block common SQLi payloads against the endpoint.
  • Change-management: test in staging, then roll out with monitoring; document remediation SLAs. If KEV true or EPSS ≥ 0.5, treat as priority 1.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.