CVE-2025-5649
📋 TL;DR
This critical vulnerability in SourceCodester Student Result Management System 1.0 allows unauthorized privileged user creation through improper access controls in the registration interface. Attackers can remotely exploit this to create administrative accounts and gain full system control. All deployments of version 1.0 are affected.
💻 Affected Systems
- SourceCodester Student Result Management System
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise where attackers create administrative accounts, access sensitive student data, modify grades, and potentially pivot to other systems.
Likely Case
Unauthorized administrative account creation leading to data theft, grade manipulation, and potential ransomware deployment.
If Mitigated
Limited impact with proper network segmentation and monitoring, though the vulnerability still exists.
🎯 Exploit Status
Public exploit available on GitHub. Attack requires no authentication and is simple to execute.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: https://www.sourcecodester.com/
Restart Required: No
Instructions:
No official patch available. Consider upgrading to a newer version if available or implementing workarounds.
🔧 Temporary Workarounds
Block Access to Vulnerable Endpoint
allRestrict access to /admin/core/new_user endpoint using web server configuration or firewall rules.
# Apache: RewriteRule ^/admin/core/new_user - [F]
# Nginx: location ~ ^/admin/core/new_user { deny all; }
Implement Authentication Middleware
allAdd authentication checks to the registration interface to verify user permissions.
🧯 If You Can't Patch
- Remove system from internet-facing networks immediately
- Implement strict network segmentation and monitor all access to the vulnerable endpoint
🔍 How to Verify
Check if Vulnerable:
Attempt to access /admin/core/new_user without authentication. If accessible, system is vulnerable.
Check Version:
Check system documentation or admin panel for version information
Verify Fix Applied:
Verify that /admin/core/new_user endpoint requires proper authentication and returns 403/401 for unauthorized requests.
📡 Detection & Monitoring
Log Indicators:
- Unauthorized POST requests to /admin/core/new_user
- New user creation from unexpected IP addresses
- Multiple failed authentication attempts followed by successful registration
Network Indicators:
- HTTP traffic to /admin/core/new_user without authentication headers
- Unusual spikes in registration requests
SIEM Query:
source="web_server" AND (uri="/admin/core/new_user" AND NOT auth_success="true")
🔗 References
- https://github.com/Watskip/GeneralResearch/blob/main/Exploits/SRMS/Unauthorized%20privileged%20user%20creation.md
- https://vuldb.com/?ctiid.311139
- https://vuldb.com/?id.311139
- https://vuldb.com/?submit.589458
- https://www.sourcecodester.com/
- https://github.com/Watskip/GeneralResearch/blob/main/Exploits/SRMS/Unauthorized%20privileged%20user%20creation.md