CVE Alert: CVE-2025-9473 – SourceCodester – Online Bank Management System

CVE-2025-9473

HIGHNo exploitation knownPoC observed

A security vulnerability has been detected in SourceCodester Online Bank Management System 1.0. This impacts an unknown function of the file /feedback.php. The manipulation of the argument msg leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used.

CVSS v3.1 (7.3)
Vendor
SourceCodester
Product
Online Bank Management System
Versions
1.0
CWE
CWE-89, SQL Injection
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Published
2025-08-26T05:02:07.198Z
Updated
2025-08-26T17:21:21.216Z

AI Summary Analysis

Risk verdict

High risk: publicly disclosed PoC and an automatable SQL injection exploitable without authentication require immediate attention.

Why this matters

An unauthenticated remote attacker can in effect read or alter data via the feedback mechanism in a web-facing financial application. If exploited, sensitive customer data could be leaked or records tampered, undermining trust and regulatory compliance. The presence of a PoC that is automatable increases the chance of rapid mass exploitation.

Most likely attack path

Remote, unauthenticated exploitation via the /feedback.php endpoint using the msg parameter. No user interaction required (UI:N), network access (AV:N), and low precondition (PR:N) mean any internet-connected instance is at risk. The impact to confidentiality, integrity and availability is high, but the scope remains local to the affected application’s DB; successful abuse could enable data exfiltration or modification without broader system compromise.

Who is most exposed

Deployments of SourceCodester Online Bank Management System that are publicly accessible and running on common LAMP stacks, especially self-hosted or lightly secured setups in small businesses or test environments.

Detection ideas

  • Unusual requests to feedback.php with suspicious msg payloads (e.g., SQL syntax, tautologies, UNION SELECT).
  • DB errors or abnormal query errors reflected in application logs.
  • Spike in HTTP 500/SQL-related error codes from the web tier.
  • Outbound data volume patterns inconsistent with normal feedback activity.
  • WAF logs showing SQL injection signatures targeting /feedback.php.

Mitigation and prioritisation

  • Apply vendor patch or upgrade to the fixed version; verify in staging before production.
  • Enforce parameterised queries and strict input validation around msg; disable dynamic SQL in this path.
  • Implement least-privilege DB accounts and monitor DB activity for anomalous reads/writes.
  • Deploy compensating controls: WAF rules for SQLi, input sanitisation, and rate limiting on the endpoint.
  • Change-management: test in a staging environment, then roll out in production with monitoring; if KEV true or EPSS ≥ 0.5, treat as priority 1. If patching lags, configure strict access controls and enhanced logging as interim measures.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.