VYPR
High severity7.3NVD Advisory· Published Oct 8, 2025· Updated Apr 29, 2026

CVE-2025-11434

CVE-2025-11434

Description

A weakness has been identified in itsourcecode Student Transcript Processing System 1.0. Affected is an unknown function of the file /login.php. Executing a manipulation of the argument uname can lead to sql injection. It is possible to launch the attack remotely. The exploit has been made available to the public and could be used for attacks.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Student Transcript Processing System 1.0 login.php has pre-auth SQL injection via uname parameter, enabling remote unauthenticated database access.

A critical SQL injection vulnerability has been identified in itsourcecode's Student Transcript Processing System 1.0. The flaw resides in the /login.php file, where the uname parameter is directly incorporated into SQL queries without proper sanitization or validation [1]. This root cause allows attackers to inject malicious SQL code through user input, bypassing intended authentication logic and directly interacting with the underlying database [1].

Attack

Vector The vulnerability is exploitable remotely without any authentication requirement. An attacker sends a specially crafted POST request to the login page, injecting SQL commands into the uname field. The provided public proof-of-concept (POC) demonstrates a boolean-based blind SQL injection technique using MySQL's RLIKE operator, allowing for iterative data extraction even without direct output [1]. No special network position or privileges are needed; the attack can be launched from any internet-connected host.

Impact

Successful exploitation grants an attacker unauthorized access to the database, enabling data theft, modification, deletion, and potentially full system control. This could lead to leakage of sensitive student transcripts, credential compromise, and service disruption [1]. The vendor's homepage lists the software as available for download, indicating potential widespread use in educational environments [2].

Mitigation

As of the CVE publication date, no official patch has been released. The vendor has been notified via the security report, and administrators are advised to implement input validation and parameterized queries as immediate workarounds. Given the public availability of exploit code, affected instances should be considered at high risk of active exploitation.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.