VYPR
High severity7.3NVD Advisory· Published Sep 25, 2025· Updated Apr 29, 2026

CVE-2025-10973

CVE-2025-10973

Description

A flaw has been found in JackieDYH Resume-management-system up to fb6b857d852dd796e748ce30c606fe5e61c18273. Affected by this issue is some unknown functionality of the file /admin/show.php. This manipulation of the argument userid causes sql injection. The attack may be initiated remotely. The exploit has been published and may be used. This product uses a rolling release model to deliver continuous updates. As a result, specific version information for affected or updated releases is not available. The vendor was contacted early about this disclosure but did not respond in any way.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A high-severity SQL injection vulnerability in the admin/show.php endpoint of the PHP Resume Management System allows unauthenticated remote attackers to execute arbitrary SQL queries.

Vulnerability

Overview

A SQL injection flaw has been identified in the userid parameter of /admin/show.php in the PHP Resume Management System (Resume-management-system by JackieDYH). The root cause is insufficient validation of user-supplied input, which is directly concatenated into SQL queries without proper sanitization. This allows an attacker to inject malicious SQL statements via the userid parameter [1].

Exploitation

Prerequisites

The attack is remotely exploitable over HTTP and requires no authentication or prior authorization. An attacker only needs to send a crafted HTTP GET request to the vulnerable endpoint with a malicious userid value. Proof-of-concept (PoC) code has been published, and the exploit is considered active [1].

Impact

Successful exploitation can lead to unauthorized database access, extraction of sensitive data (e.g., user credentials, resume details), data modification or deletion, and potentially full system compromise. The vulnerability also enables time-based blind SQL injection, which can be used to enumerate database contents even without visible error output [1].

Mitigation

Status

The vendor was contacted but did not respond. The software uses a rolling release model, and no specific patched version has been announced. As of the disclosure date, the vulnerability remains unaddressed, and administrators are advised to restrict access to the admin panel or remove the vulnerable script until a fix is applied [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2
  • <=fb6b857d852dd796e748ce30c606fe5e61c18273+ 1 more
    • (no CPE)range: <=fb6b857d852dd796e748ce30c606fe5e61c18273
    • (no CPE)range: <= fb6b857d852dd796e748ce30c606fe5e61c18273

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.