Vulnerability Description
A vulnerability was detected in SourceCodester Simple Forum Discussion System 1.0. This impacts an unknown function of the file /admin_class.php?action=login. Performing manipulation of the argument Username results in sql injection. It is possible to initiate the attack remotely. The exploit is now public and may be used.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Oretnom23 | Simple Forum\/Discussion System | 1.0 |
Related Weaknesses (CWE)
References
- https://github.com/bdrfly/cve/issues/1ExploitIssue TrackingThird Party Advisory
- https://vuldb.com/?ctiid.323080Permissions RequiredVDB Entry
- https://vuldb.com/?id.323080Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.645389Third Party AdvisoryVDB Entry
- https://www.sourcecodester.com/Product
FAQ
What is CVE-2025-10100?
CVE-2025-10100 is a vulnerability with a CVSS score of 7.3 (HIGH). A vulnerability was detected in SourceCodester Simple Forum Discussion System 1.0. This impacts an unknown function of the file /admin_class.php?action=login. Performing manipulation of the argument U...
How severe is CVE-2025-10100?
CVE-2025-10100 has been rated HIGH with a CVSS base score of 7.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-10100?
Check the references section above for vendor advisories and patch information. Affected products include: Oretnom23 Simple Forum\/Discussion System.