CVE-2025-10973
Description
A flaw has been found in JackieDYH Resume-management-system up to fb6b857d852dd796e748ce30c606fe5e61c18273. Affected by this issue is some unknown functionality of the file /admin/show.php. This manipulation of the argument userid causes sql injection. The attack may be initiated remotely. The exploit has been published and may be used. This product uses a rolling release model to deliver continuous updates. As a result, specific version information for affected or updated releases is not available. The vendor was contacted early about this disclosure but did not respond in any way.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A high-severity SQL injection vulnerability in the admin/show.php endpoint of the PHP Resume Management System allows unauthenticated remote attackers to execute arbitrary SQL queries.
Vulnerability
Overview
A SQL injection flaw has been identified in the userid parameter of /admin/show.php in the PHP Resume Management System (Resume-management-system by JackieDYH). The root cause is insufficient validation of user-supplied input, which is directly concatenated into SQL queries without proper sanitization. This allows an attacker to inject malicious SQL statements via the userid parameter [1].
Exploitation
Prerequisites
The attack is remotely exploitable over HTTP and requires no authentication or prior authorization. An attacker only needs to send a crafted HTTP GET request to the vulnerable endpoint with a malicious userid value. Proof-of-concept (PoC) code has been published, and the exploit is considered active [1].
Impact
Successful exploitation can lead to unauthorized database access, extraction of sensitive data (e.g., user credentials, resume details), data modification or deletion, and potentially full system compromise. The vulnerability also enables time-based blind SQL injection, which can be used to enumerate database contents even without visible error output [1].
Mitigation
Status
The vendor was contacted but did not respond. The software uses a rolling release model, and no specific patched version has been announced. As of the disclosure date, the vulnerability remains unaddressed, and administrators are advised to restrict access to the admin panel or remove the vulnerable script until a fix is applied [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2<=fb6b857d852dd796e748ce30c606fe5e61c18273+ 1 more
- (no CPE)range: <=fb6b857d852dd796e748ce30c606fe5e61c18273
- (no CPE)range: <= fb6b857d852dd796e748ce30c606fe5e61c18273
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.