VYPR
High severity7.3NVD Advisory· Published Sep 1, 2025· Updated Apr 29, 2026

CVE-2025-9788

CVE-2025-9788

Description

A vulnerability was determined in SourceCodester/Campcodes School Log Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/admin_class.php. Executing manipulation of the argument id_no can lead to sql injection. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

SQL injection in SourceCodester/Campcodes School Log Management System 1.0 via the id_no parameter in /admin/admin_class.php allows remote unauthenticated attackers to execute arbitrary SQL queries.

Vulnerability

Analysis

CVE-2025-9788 describes a SQL injection vulnerability in the SourceCodester/Campcodes School Log Management System version 1.0. The flaw resides in the /admin/admin_class.php file within the admin directory. The root cause is the lack of proper input sanitization or validation for the id_no` parameter, which is directly concatenated into SQL queries. This allows an attacker to inject malicious SQL code through this parameter [1].

Exploitation

The attack can be launched remotely and does not require authentication or authorization [1]. The vulnerable parameter is id_no, which is sent via a POST request (multipart form data). The publicly disclosed proof-of-concept demonstrates a time-based blind SQL injection technique using the MySQL SLEEP() function, confirming that the injection is exploitable without any prior login [1].

Impact

Successful exploitation enables an attacker to perform unauthorized database operations, including reading, modifying, or deleting sensitive data. This could lead to full database compromise, exposure of user credentials or logs, and potential escalation to broader system control. The impact is severe as it threatens data integrity and system confidentiality [1].

Mitigation

As of the publication date, no official patch has been released by the vendor. The product appears to be a legacy or unmaintained project. Users are advised to apply input validation and parameterized queries to the affected file, or discontinue use of the system if possible. The vulnerability has been publicly disclosed, increasing the risk of exploitation [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.