CVE Alert: CVE-2025-9764 – itsourcecode – Sports Management System

CVE-2025-9764

HIGHNo exploitation known

A flaw has been found in itsourcecode Sports Management System 1.0. Impacted is an unknown function of the file /Admin/resultdetails.php. This manipulation of the argument ID causes sql injection. The attack may be initiated remotely. The exploit has been published and may be used.

CVSS v3.1 (7.3)

Details

  • Vendor: itsourcecode
  • Product: Sports Management System
  • Versions: 1.0
  • CWE: CWE-89, SQL Injection
  • Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
  • Published: 2025-09-01T05:32:07.004Z
  • Updated: 2025-09-01T05:32:07.004Z

AI Summary Analysis

Risk verdict

High risk: remote SQL injection with unauthenticated access, and a published exploit; urgent remediation recommended.

Why this matters

Attackers can read or tamper with database content via the web interface, potentially exposing member or transaction data and degrading data integrity. Publicly known exploitation raises the likelihood of automated scans and rapid attempts across exposed deployments, risking compliance and reputational harm.

Most likely attack path

An unauthenticated attacker sends a crafted request to the affected endpoint (resultdetails.php) to trigger SQL injection. With network access (AV:N), low complexity (AC:L), no user interaction (UI:N) and no privileges required (PR:N), the attack can operate directly over the web without user auth, within the application’s scope. The impact is primarily data leakage or modification; lateral movement is unlikely unless the compromised DB access is shared with other systems.

Who is most exposed

Public-facing installations of itsourcecode Sports Management System 1.0, especially in SMEs or hosted environments where the admin path (/Admin/resultdetails.php) is reachable from the internet without additional hardening.

Detection ideas

  • Web server logs show requests with suspicious IDs or SQL keywords (SELECT/UNION/INFORMATION_SCHEMA) to resultdetails.php.
  • Error messages or stack traces leaking DB syntax in HTTP responses or log files.
  • IDS/IPS or WAF alerts for SQL injection patterns targeting the endpoint.
  • Anomalous data responses or unexpected data changes after specific requests.
  • Repeated failed or anomalous authentication-related events tied to the admin path.

Mitigation and prioritisation

  • Apply vendor patch or upgrade to a version with the fix; if unavailable, implement strict input handling and parameterised queries.
  • Enforce authentication and access controls on the admin path; restrict exposure to trusted networks.
  • Implement a web application firewall rule set to block SQLi patterns against resultdetails.php; disable or mitigate direct DB exposure from the web server.
  • Review DB permissions; use least-privilege accounts (read/write only where needed).
  • Plan a controlled remediation window; test in staging before production rollout; monitor for repeatable exploit attempts.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.