CVE-2025-11434
Description
A weakness has been identified in itsourcecode Student Transcript Processing System 1.0. Affected is an unknown function of the file /login.php. Executing a manipulation of the argument uname can lead to sql injection. It is possible to launch the attack remotely. The exploit has been made available to the public and could be used for attacks.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Student Transcript Processing System 1.0 login.php has pre-auth SQL injection via uname parameter, enabling remote unauthenticated database access.
A critical SQL injection vulnerability has been identified in itsourcecode's Student Transcript Processing System 1.0. The flaw resides in the /login.php file, where the uname parameter is directly incorporated into SQL queries without proper sanitization or validation [1]. This root cause allows attackers to inject malicious SQL code through user input, bypassing intended authentication logic and directly interacting with the underlying database [1].
Attack
Vector The vulnerability is exploitable remotely without any authentication requirement. An attacker sends a specially crafted POST request to the login page, injecting SQL commands into the uname field. The provided public proof-of-concept (POC) demonstrates a boolean-based blind SQL injection technique using MySQL's RLIKE operator, allowing for iterative data extraction even without direct output [1]. No special network position or privileges are needed; the attack can be launched from any internet-connected host.
Impact
Successful exploitation grants an attacker unauthorized access to the database, enabling data theft, modification, deletion, and potentially full system control. This could lead to leakage of sensitive student transcripts, credential compromise, and service disruption [1]. The vendor's homepage lists the software as available for download, indicating potential widespread use in educational environments [2].
Mitigation
As of the CVE publication date, no official patch has been released. The vendor has been notified via the security report, and administrators are advised to implement input validation and parameterized queries as immediate workarounds. Given the public availability of exploit code, affected instances should be considered at high risk of active exploitation.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: = 1.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/yihaofuweng/cve/issues/49nvdExploitIssue TrackingThird Party Advisory
- vuldb.comnvdThird Party AdvisoryVDB Entry
- vuldb.comnvdThird Party AdvisoryVDB Entry
- itsourcecode.comnvdProduct
- vuldb.comnvdPermissions RequiredVDB Entry
News mentions
0No linked articles in our index yet.