CVE-2025-10033
Description
A vulnerability has been found in itsourcecode Online Discussion Forum 1.0. This affects an unknown function of the file /admin. Such manipulation of the argument Username leads to sql injection. The attack may be performed from remote. The exploit has been disclosed to the public and may be used.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Online Discussion Forum 1.0 has a pre-auth SQL injection in /admin via the username parameter, allowing remote attackers to extract or tamper with database contents.
Vulnerability
Analysis
CVE-2025-10033 describes a SQL injection vulnerability in itsourcecode Online Discussion Forum 1.0. The flaw resides in the /admin file, where the username POST parameter is directly concatenated into SQL queries without sanitization or parameterization [1]. This constitutes a classic SQL injection root cause: untrusted user input is used to build a database query, enabling an attacker to alter the query's logic.
Exploitation
The vulnerability is exploitable remotely without any authentication or prior access [1]. The provided proof-of-concept-of-operations (POC) demonstrates a time-based blind SQL injection payload using MySQL's SLEEP() function, confirming that an attacker can infer information from the database by observing response delays [1]. No special privileges or network position is required; the attack surface is the publicly accessible /admin endpoint.
Impact
Successful exploitation allows an attacker to achieve unauthorized database access, read sensitive data, modify or delete records, and potentially gain comprehensive control over the application's backend [1]. Because the injection occurs in an administrative interface, the attacker could escalate privileges, extract user credentials, or disrupt service availability. The vendor's own description rates the severity as High (CVSS 7.3), reflecting the critical nature of the flaw.
Mitigation
As of the publication date, no official patch or fixed version has been released by itsourcecode [2]. The project's vendor homepage remains active, but no advisory or update addressing this vulnerability is available. Users of Online Discussion Forum 1.0 should apply input validation and parameterized queries to the /admin endpoint as a workaround, or consider migrating to an alternative, actively maintained forum solution.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- cpe:2.3:a:emiloimagtolis:online_discussion_forum:1.0:*:*:*:*:*:*:*
- Range: = 1.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/insider-w/CVE/issues/1nvdExploitIssue TrackingThird Party Advisory
- vuldb.comnvdThird Party AdvisoryVDB Entry
- vuldb.comnvdThird Party AdvisoryVDB Entry
- itsourcecode.comnvdProduct
- vuldb.comnvdPermissions RequiredVDB Entry
News mentions
0No linked articles in our index yet.