CVE-2025-10405
📋 TL;DR
CVE-2025-10405 is a SQL injection vulnerability in itsourcecode Baptism Information Management System 1.0 that allows remote attackers to execute arbitrary SQL commands via the bapt_id parameter in /listbaptism.php. This affects all deployments of this specific software version. Attackers can potentially read, modify, or delete database content.
💻 Affected Systems
- itsourcecode Baptism Information Management System
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise including data theft, data manipulation, authentication bypass, and potential remote code execution if database permissions allow.
Likely Case
Unauthorized data access and extraction of sensitive baptism records, potentially including personal information.
If Mitigated
Limited impact if proper input validation and parameterized queries are implemented.
🎯 Exploit Status
Exploit details are publicly available on GitHub. Attack requires no authentication and uses simple SQL injection techniques.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: https://itsourcecode.com/
Restart Required: No
Instructions:
No official patch available. Consider implementing parameterized queries in /listbaptism.php or migrating to alternative software.
🔧 Temporary Workarounds
Input Validation Filter
allAdd input validation to sanitize bapt_id parameter before processing
Modify /listbaptism.php to include: $bapt_id = filter_var($_GET['bapt_id'], FILTER_VALIDATE_INT); if (!$bapt_id) { die('Invalid input'); }
Web Application Firewall
allDeploy WAF with SQL injection protection rules
🧯 If You Can't Patch
- Isolate the system from internet access and restrict to internal network only
- Implement strict network segmentation and monitor all database queries from the application
🔍 How to Verify
Check if Vulnerable:
Test /listbaptism.php?bapt_id=1' OR '1'='1 to see if SQL error occurs
Check Version:
Check software version in admin panel or readme files
Verify Fix Applied:
Test with same payload - should return error message or no data instead of SQL error
📡 Detection & Monitoring
Log Indicators:
- SQL syntax errors in application logs
- Unusual database queries from web server IP
- Multiple failed parameter validation attempts
Network Indicators:
- HTTP requests to /listbaptism.php with SQL keywords in parameters
- Unusual database traffic patterns
SIEM Query:
source="web_logs" AND uri="/listbaptism.php" AND (param="*SELECT*" OR param="*UNION*" OR param="*OR*'*'*'*")