A SQL Injection vulnerability has been identified in SourceCodester Online Farm Management System versions 1.0. This flaw allows attackers to manipulate database queries through the 'uname' parameter within the /Login/login.php file, potentially granting unauthorized access to sensitive information. The vulnerability is remotely exploitable and a public proof-of-concept exists, highlighting the urgency of remediation. Version 1.0.1 addresses this security concern.
Successful exploitation of CVE-2025-9833 could allow an attacker to bypass authentication and gain unauthorized access to the Online Farm Management System's database. This could lead to the exfiltration of sensitive data such as user credentials, farm inventory details, financial records, and other confidential information. Depending on the database schema, an attacker might also be able to modify or delete data, disrupting farm operations. The public availability of a proof-of-concept significantly increases the risk of exploitation, making it a high-priority concern for organizations using this system.
This vulnerability is considered actively exploitable due to the public availability of a proof-of-concept. It was disclosed on 2025-09-02. The vulnerability has been added to the CISA KEV catalog, indicating a heightened risk of exploitation. Attackers are likely to leverage the readily available exploit to target vulnerable installations of the Online Farm Management System.
Small to medium-sized farms and agricultural businesses that rely on the Online Farm Management System for operational management are particularly at risk. Organizations using shared hosting environments where the system is deployed may also be vulnerable, as they may lack control over the underlying server configuration and security patches.
• php / web: Examine access logs for suspicious requests to /Login/login.php with unusual parameters in the 'uname' field. Look for patterns indicative of SQL injection attempts (e.g., single quotes, double quotes, semicolons).
• generic web: Use curl to test the /Login/login.php endpoint with a simple SQL injection payload (e.g., ' OR '1'='1) and observe the response for unexpected behavior or error messages.
• generic web: Check for unusual database activity or errors in the application's error logs that might indicate a SQL injection attack.
• generic web: Implement rate limiting on the /Login/login.php endpoint to mitigate brute-force attempts to exploit the vulnerability.
disclosure
poc
patch
漏洞利用状态
EPSS
0.03% (8% 百分位)
CISA SSVC
CVSS 向量
The primary mitigation for CVE-2025-9833 is to immediately upgrade to version 1.0.1 of the Online Farm Management System. If upgrading is not immediately feasible, consider implementing temporary workarounds such as input validation and sanitization on the 'uname' parameter within the /Login/login.php file. While not a complete solution, this can help reduce the attack surface. Web application firewalls (WAFs) configured to detect and block SQL injection attempts can also provide an additional layer of protection. After upgrading, verify the fix by attempting a SQL injection attack on the /Login/login.php endpoint using a standard SQL injection payload to ensure the vulnerability is no longer present.
升级到 Online Farm Management System 的补丁版本。如果不可用,请审查并清理 /Login/login.php 文件中的用户输入,特别是 'uname' 参数,以防止 SQL 注入。实施数据验证和转义。
漏洞分析和关键警报直接发送到您的邮箱。
CVE-2025-9833 is a SQL Injection vulnerability affecting Online Farm Management System versions 1.0, allowing attackers to manipulate database queries via the 'uname' parameter in /Login/login.php.
You are affected if you are using Online Farm Management System version 1.0. Upgrade to version 1.0.1 to mitigate the risk.
The recommended fix is to upgrade to version 1.0.1. As a temporary workaround, implement input validation and sanitization on the 'uname' parameter.
Yes, CVE-2025-9833 is considered actively exploited due to the public availability of a proof-of-concept and its inclusion in the CISA KEV catalog.
Refer to the SourceCodester website or their official communication channels for the advisory regarding CVE-2025-9833.
上传你的依赖文件,立即了解此CVE和其他CVE是否影响你。