CVE Alert: CVE-2025-10687 – SourceCodester – Responsive E-Learning System
CVE-2025-10687
A vulnerability was found in SourceCodester Responsive E-Learning System 1.0. This affects an unknown part of the file /admin/add_teacher.php. The manipulation of the argument Username results in sql injection. It is possible to launch the attack remotely. The exploit has been made public and could be used.
AI Summary Analysis
Risk verdict
High risk due to a remotely exploitable SQL injection on an externally accessible admin endpoint, with public exploit details available.
Why this matters
An unauthenticated attacker can potentially read, modify, or corrupt data and exfiltrate information without user interaction. In education deployments, this can disrupt courses, expose student data, and enable further compromise of the hosting environment.
Most likely attack path
Attacker targets the vulnerable parameter to trigger SQL injection over the network, without authentication or UI prompts. Successful injections could enumerate or modify the database, and may facilitate credential access or persistence within the affected system.
Who is most exposed
Any organisation hosting this system with an Internet-facing admin interface is at risk, particularly smaller education sites or hosted LMS deployments that run default configurations and have limited hardening around administrative endpoints.
Detection ideas
- Repeated SQL syntax errors or database error messages in application logs.
 - Unusual or crafted values targeting the Username parameter in authentication/admin flows.
 - High volumes of requests to the admin endpoint from diverse IPs; bursts aligning with login/registration routes.
 - Anomalous data exfiltration patterns or unexpected account changes.
 - WAF/IDS alerts for SQLi patterns or known payloads targeting input fields.
 
Mitigation and prioritisation
- Apply vendor patch or upgrade to a fixed release immediately.
 - Implement parameterised queries and input validation for the affected endpoint; restrict database privileges.
 - Lock down admin interfaces to trusted networks or require strong multi-factor authentication.
 - Add web application firewall rules to block common SQLi payloads and monitor for injection attempts.
 - Initiate change-management: test fixes in staging, verify integrity of user data post-fix, and review access logs for indicators of compromise. If exploitability is confirmed in your environment, treat as urgent risk and accelerate patching.
 
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.
