CVE Alert: CVE-2025-9421 – itsourcecode – Apartment Management System

CVE-2025-9421

HIGHNo exploitation known

A vulnerability has been found in itsourcecode Apartment Management System 1.0. This affects an unknown function of the file /complain/addcomplain.php. The manipulation of the argument ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

CVSS v3.1 (7.3)
Vendor
itsourcecode
Product
Apartment Management System
Versions
1.0
CWE
CWE-89, SQL Injection
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Published
2025-08-25T22:02:07.902Z
Updated
2025-08-25T22:02:07.902Z

AI Summary Analysis

Risk verdict

High risk. Remote, unauthenticated SQL injection with public exploit details; treat as a priority given exposure and active tooling.

Why this matters

The vulnerability enables data disclosure and potential tampering with minimal attacker effort, risking resident information and system integrity. Public exploit availability raises the likelihood of automated attempts and rapid weaponisation against any internet-facing deployments.

Most likely attack path

Network-based exploitation: no user interaction or privileges required. An attacker petitions the addcomplain.php endpoint with crafted ID values to trigger a SQL injection, potentially leaking or altering database contents and impacting availability. Lateral impact is limited by scope but data integrity and access control may be compromised on the affected component.

Who is most exposed

Web-facing deployments of itsourcecode Apartment Management System 1.0 are most at risk, particularly SMB customers hosting the app on internet-accessible servers with minimal input validation and weak database hardening.

Detection ideas

  • Spike in requests to addcomplain.php with unusual ID payloads
  • SQL error messages or database error logs indicating injection attempts
  • WAF/IDS alerts matching SQLi patterns
  • Anomalous data read/write activity from the app database
  • Recurrent failed/incomplete transactions correlating with parameter manipulation

Mitigation and prioritisation

  • Apply vendor patch or upgrade to fixed version; verify remediation is in place
  • Implement parameterised queries and strict input validation around the ID parameter
  • Enable SQLi-focused WAF rules and tighten URL access to addcomplain.php
  • Disable or restrict access to the endpoint for non-critical use; enforce least privilege
  • Change-management: schedule immediate patch window; heightened monitoring during rollout; treat as priority 1 if KEV or EPSS indicators confirm active exploitation (otherwise high).

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.