CVE Alert: CVE-2025-9767 – itsourcecode – Sports Management System

CVE-2025-9767

HIGHNo exploitation known

A vulnerability was determined in itsourcecode Sports Management System 1.0. This affects an unknown function of the file /Admin/sporttype.php. Executing manipulation of the argument code can lead to sql injection. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized.

CVSS v3.1 (7.3)
Vendor
itsourcecode
Product
Sports Management System
Versions
1.0
CWE
CWE-89, SQL Injection
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Published
2025-09-01T07:02:06.815Z
Updated
2025-09-01T07:02:06.815Z

AI Summary Analysis

Risk verdict

High risk: remote SQL injection with a publicly disclosed exploit exists, enabling unauthenticated access to potentially exfiltrate or tamper data.

Why this matters

The vulnerability affects a management system likely handling member, scheduling or financial data. Successful exploitation can expose sensitive information, enable data manipulation, or disrupt operations, with reputational and regulatory implications for the organisation.

Most likely attack path

The flaw stems from a parameterised input in /Admin/sporttype.php. With AV:N, PR:N and UI:N, an attacker can trigger the injection over the network without authentication, assuming the app uses the compromised query. The impact on confidentiality, integrity and availability is L, so data leakage or modification is plausible but full service outage is less likely. An attacker could repeatedly fetch or alter data until input constraints or layer protections kick in.

Who is most exposed

Web deployments hosting itsourcecode Sports Management System v1.0, particularly where the admin page is publicly accessible (e.g., on shared hosting or SaaS setups with exposed admin endpoints), are at highest risk.

Detection ideas

  • Monitor for unusual query strings and payloads targeting the code parameter on sporttype.php.
  • Look for SQL error messages or signs of database error leakage in web/app logs.
  • Alert on abnormal data retrieval patterns from the admin endpoint.
  • WAF/IDS triggers for classic SQLi signatures against the parameter.
  • Spike in failed/suspicious login attempts aligned with admin URL access.

Mitigation and prioritisation

  • Apply vendor patch or upgrade to a safeguarded release; if unavailable, implement strong input handling (parameterised queries, prepared statements) and validate all inputs.
  • Restrict access to /Admin/sporttype.php (IP allowlists, VPN, MFA for admins) and employ least-privilege DB accounts.
  • Deploy compensating controls: WAF rules for SQLi, disable verbose DB error messages, monitor for abnormal data access.
  • Change-management: test fixes in a staging environment, schedule rollout outside peak hours, document rollback plan.
  • Consider treating as priority 1 if there is evidence of active exploitation or confirmed KEV/EPSS indicators; otherwise maintain elevated monitoring until patch is applied.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.