Vulnerability Description
A vulnerability was found in SourceCodester COVID 19 Testing Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /login.php. The manipulation of the argument Username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Unyasoft | Covid19 Testing Management System | 1.0 |
Related Weaknesses (CWE)
References
- https://github.com/lrjbsyh/CVE_Hunter/issues/2#issue-3307768438ExploitIssue TrackingThird Party Advisory
- https://vuldb.com/?ctiid.319885Permissions RequiredVDB Entry
- https://vuldb.com/?id.319885Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.631603Third Party AdvisoryVDB Entry
- https://www.sourcecodester.com/Product
- https://github.com/lrjbsyh/CVE_Hunter/issues/2#issue-3307768438ExploitIssue TrackingThird Party Advisory
FAQ
What is CVE-2025-8926?
CVE-2025-8926 is a vulnerability with a CVSS score of 7.3 (HIGH). A vulnerability was found in SourceCodester COVID 19 Testing Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /login.php. The manipulation of the argument ...
How severe is CVE-2025-8926?
CVE-2025-8926 has been rated HIGH with a CVSS base score of 7.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-8926?
Check the references section above for vendor advisories and patch information. Affected products include: Unyasoft Covid19 Testing Management System.