VYPR
High severity7.3NVD Advisory· Published Sep 6, 2025· Updated Apr 29, 2026

CVE-2025-10033

CVE-2025-10033

Description

A vulnerability has been found in itsourcecode Online Discussion Forum 1.0. This affects an unknown function of the file /admin. Such manipulation of the argument Username leads to sql injection. The attack may be performed from remote. The exploit has been disclosed to the public and may be used.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Online Discussion Forum 1.0 has a pre-auth SQL injection in /admin via the username parameter, allowing remote attackers to extract or tamper with database contents.

Vulnerability

Analysis

CVE-2025-10033 describes a SQL injection vulnerability in itsourcecode Online Discussion Forum 1.0. The flaw resides in the /admin file, where the username POST parameter is directly concatenated into SQL queries without sanitization or parameterization [1]. This constitutes a classic SQL injection root cause: untrusted user input is used to build a database query, enabling an attacker to alter the query's logic.

Exploitation

The vulnerability is exploitable remotely without any authentication or prior access [1]. The provided proof-of-concept-of-operations (POC) demonstrates a time-based blind SQL injection payload using MySQL's SLEEP() function, confirming that an attacker can infer information from the database by observing response delays [1]. No special privileges or network position is required; the attack surface is the publicly accessible /admin endpoint.

Impact

Successful exploitation allows an attacker to achieve unauthorized database access, read sensitive data, modify or delete records, and potentially gain comprehensive control over the application's backend [1]. Because the injection occurs in an administrative interface, the attacker could escalate privileges, extract user credentials, or disrupt service availability. The vendor's own description rates the severity as High (CVSS 7.3), reflecting the critical nature of the flaw.

Mitigation

As of the publication date, no official patch or fixed version has been released by itsourcecode [2]. The project's vendor homepage remains active, but no advisory or update addressing this vulnerability is available. Users of Online Discussion Forum 1.0 should apply input validation and parameterized queries to the /admin endpoint as a workaround, or consider migrating to an alternative, actively maintained forum solution.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.