CVE Alert: CVE-2025-10836 – SourceCodester – Pet Grooming Management Software
CVE-2025-10836
A weakness has been identified in SourceCodester Pet Grooming Management Software 1.0. Affected is an unknown function of the file /admin/print1.php. Executing manipulation of the argument ID can lead to sql injection. The attack can be launched remotely. The exploit has been made available to the public and could be exploited.
AI Summary Analysis
Risk verdict
Why this matters
Most likely attack path
Who is most exposed
Detection ideas
- Logs show anomalous requests to print1.php with suspicious ID values or SQL payloads.
- Web/app server error logs reveal SQL error messages from the endpoint.
- IDS/IPS or WAF triggers on SQLi patterns targeting the endpoint.
- Abnormal query volume or unusual data access patterns in DB logs.
- Spike in 500/log errors coinciding with ID parameter requests.
Mitigation and prioritisation
- Apply the vendor patch or upgrade to the fixed version; if unavailable, implement input validation and parameterised queries immediately.
- Restrict or disable external access to the admin endpoint; enforce MFA for admin accounts.
- Deploy WAF/IDS rules to block common SQLi payloads against print1.php; monitor for abuse.
- Review and harden DB privileges, network segmentation, and least‑privilege access between app and database.
- Schedule patching within a defined maintenance window; perform testing in a staging environment.
- If KEV is true or EPSS ≥ 0.5, treat as priority 1. (Data not provided in this context; update if indicators are available.)
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.