CVE-2025-10973
📋 TL;DR
This CVE describes a SQL injection vulnerability in the JackieDYH Resume-management-system's /admin/show.php file via the userid parameter. Attackers can remotely exploit this flaw to execute arbitrary SQL commands on the database. Organizations using affected versions of this resume management system are at risk.
💻 Affected Systems
- JackieDYH Resume-management-system
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise including data theft, data manipulation, privilege escalation, and potential remote code execution if database functions allow it.
Likely Case
Unauthorized access to sensitive resume data, extraction of user credentials, and potential administrative access to the application.
If Mitigated
Limited impact with proper input validation, parameterized queries, and database permissions restricting SQL execution.
🎯 Exploit Status
Exploit details have been published on GitHub. The vulnerability requires access to the admin interface but SQL injection is typically straightforward to exploit once access is obtained.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: None available
Restart Required: No
Instructions:
No official patch available. The vendor did not respond to disclosure. Consider migrating to alternative software or implementing workarounds.
🔧 Temporary Workarounds
Input Validation and Sanitization
allImplement strict input validation for the userid parameter in /admin/show.php to only accept expected data types and formats.
Web Application Firewall (WAF)
allDeploy a WAF with SQL injection protection rules to block malicious requests targeting the vulnerable endpoint.
🧯 If You Can't Patch
- Isolate the vulnerable system in a restricted network segment with minimal access
- Implement strict access controls to the admin interface and monitor for suspicious SQL queries
🔍 How to Verify
Check if Vulnerable:
Check if your system uses JackieDYH Resume-management-system commit fb6b857d852dd796e748ce30c606fe5e61c18273 or earlier. Test the /admin/show.php endpoint with SQL injection payloads in the userid parameter.
Check Version:
Check git commit history or version files in the application directory
Verify Fix Applied:
Verify that SQL injection attempts against the userid parameter in /admin/show.php are properly rejected or sanitized.
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL queries in database logs
- Multiple failed login attempts to admin interface
- Suspicious userid parameter values in web server logs
Network Indicators:
- SQL injection patterns in HTTP requests to /admin/show.php
- Unexpected database connections from web server
SIEM Query:
source="web_server" AND uri="/admin/show.php" AND (userid CONTAINS "'" OR userid CONTAINS "--" OR userid CONTAINS "UNION")