CVE Alert: CVE-2025-9765 – itsourcecode – Sports Management System

CVE-2025-9765

HIGHNo exploitation known

A vulnerability has been found in itsourcecode Sports Management System 1.0. The affected element is an unknown function of the file /Admin/tournament_details.php. Such manipulation of the argument ID leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

CVSS v3.1 (7.3)
Vendor
itsourcecode
Product
Sports Management System
Versions
1.0
CWE
CWE-89, SQL Injection
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Published
2025-09-01T06:02:07.242Z
Updated
2025-09-01T06:02:07.242Z

AI Summary Analysis

Risk verdict

Publicly disclosed, unauthenticated remote SQL injection against an admin PHP endpoint creates a high‑risk exposure requiring urgent remediation.

Why this matters

Successful exploitation can lead to data exposure and integrity compromise of tournament records, with potential leakage of participant information. The availability impact is plausible if the attacker disrupts or manipulates database content, and there is public tooling to assist exploitation, enabling rapid automated attacks.

Most likely attack path

Remote, no user interaction required, no privileges needed, and no authentication required to trigger the injection. An attacker can supply crafted input to the ID parameter on the admin page to alter or exfiltrate data, leveraging the unchanged scope to access backend data under the same database context.

Who is most exposed

Internet‑facing installations of the sports management system, especially those with publicly accessible admin panels or weak network segmentation, including small organisations and hosting providers.

Detection ideas

  • Frequent requests to tournament_details.php with varying ID values, including anomalous payloads
  • SQL error messages or stack traces leaking into responses
  • Sudden spikes in admin page errors or unusual data retrieval patterns
  • Unexplained data reads/writes from the database tied to the vulnerable endpoint
  • Unusual authentication or access attempts from unfamiliar IPs targeting the admin area

Mitigation and prioritisation

  • Apply vendor patch or upgrade to a fixed version; if unavailable, implement strict input validation and parameterised queries
  • Block or constrain access to the admin endpoint (VPN, allowlists, or WAF rules targeting SQLi)
  • Implement least-privilege database accounts; restrict DB user permissions for the app
  • Enable monitoring for anomalous data access and enable robust alerting on admin pages
  • Schedule a rapid patching window and verify backups prior to remediation

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.