CVE-2025-9788
Description
A vulnerability was determined in SourceCodester/Campcodes School Log Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/admin_class.php. Executing manipulation of the argument id_no can lead to sql injection. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
SQL injection in SourceCodester/Campcodes School Log Management System 1.0 via the id_no parameter in /admin/admin_class.php allows remote unauthenticated attackers to execute arbitrary SQL queries.
Vulnerability
Analysis
CVE-2025-9788 describes a SQL injection vulnerability in the SourceCodester/Campcodes School Log Management System version 1.0. The flaw resides in the /admin/admin_class.php file within the admin directory. The root cause is the lack of proper input sanitization or validation for the id_no` parameter, which is directly concatenated into SQL queries. This allows an attacker to inject malicious SQL code through this parameter [1].
Exploitation
The attack can be launched remotely and does not require authentication or authorization [1]. The vulnerable parameter is id_no, which is sent via a POST request (multipart form data). The publicly disclosed proof-of-concept demonstrates a time-based blind SQL injection technique using the MySQL SLEEP() function, confirming that the injection is exploitable without any prior login [1].
Impact
Successful exploitation enables an attacker to perform unauthorized database operations, including reading, modifying, or deleting sensitive data. This could lead to full database compromise, exposure of user credentials or logs, and potential escalation to broader system control. The impact is severe as it threatens data integrity and system confidentiality [1].
Mitigation
As of the publication date, no official patch has been released by the vendor. The product appears to be a legacy or unmaintained project. Users are advised to apply input validation and parameterized queries to the affected file, or discontinue use of the system if possible. The vulnerability has been publicly disclosed, increasing the risk of exploitation [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- cpe:2.3:a:campcodes:school_log_management_system:1.0:*:*:*:*:*:*:*
- Range: = 1.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/wyyyxxxx1017/CVE/issues/10nvdExploitIssue Tracking
- vuldb.comnvdThird Party AdvisoryVDB Entry
- vuldb.comnvdThird Party AdvisoryVDB Entry
- vuldb.comnvdPermissions RequiredVDB Entry
News mentions
0No linked articles in our index yet.