CVE-2025-10111
📋 TL;DR
This SQL injection vulnerability in itsourcecode Student Information Management System 1.0 allows remote attackers to execute arbitrary SQL commands via the ID parameter in /admin/modules/instructor/index.php. This can lead to data theft, modification, or deletion. Organizations using this specific software version are affected.
💻 Affected Systems
- itsourcecode Student Information Management System
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise including sensitive student/personnel data exfiltration, system takeover via privilege escalation, and potential ransomware deployment.
Likely Case
Unauthorized access to student records, grade manipulation, instructor data theft, and potential lateral movement within the system.
If Mitigated
Limited impact with proper input validation, database permissions, and network segmentation preventing full exploitation.
🎯 Exploit Status
Public exploit available on GitHub. Remote execution with simple parameter manipulation makes this easily weaponizable.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: https://itsourcecode.com/
Restart Required: No
Instructions:
1. Check vendor website for updates 2. If no patch, implement workarounds 3. Consider migrating to supported software
🔧 Temporary Workarounds
Input Validation Filter
allAdd parameter validation to sanitize ID input before SQL query
// In /admin/modules/instructor/index.php, replace raw ID usage with: $id = intval($_GET['ID']); // or mysqli_real_escape_string()
Web Application Firewall Rule
allBlock SQL injection patterns targeting the vulnerable endpoint
ModSecurity rule: SecRule ARGS:ID "@detectSQLi" "id:1001,phase:2,deny,status:403,msg:'SQLi attempt on instructor module'"
🧯 If You Can't Patch
- Network segmentation: Isolate the system from internet and restrict access to authorized users only
- Database hardening: Implement least privilege database accounts, enable logging, and regular backup verification
🔍 How to Verify
Check if Vulnerable:
Test the endpoint with SQL injection payloads: /admin/modules/instructor/index.php?ID=1' OR '1'='1
Check Version:
Check software version in admin panel or readme files. Default installation shows 'Student Information Management System 1.0'
Verify Fix Applied:
Attempt SQL injection tests and verify they're blocked or sanitized. Check that parameter validation is implemented.
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL errors in PHP/application logs
- Multiple requests to /admin/modules/instructor/index.php with special characters in ID parameter
- Database queries with UNION, SELECT, FROM patterns from web server IP
Network Indicators:
- HTTP requests containing SQL keywords (UNION, SELECT, etc.) to the vulnerable endpoint
- Unusual outbound database connections from web server
SIEM Query:
source="web_logs" AND uri="/admin/modules/instructor/index.php" AND (query="*UNION*" OR query="*SELECT*" OR query="*' OR '*"*)