CVE-2025-9699

A vulnerability was detected in SourceCodester Online Polling System Code 1.0. This vulnerability affects unknown code of the file /admin/checklogin.php. The manipulation of the argument myusername results in sql injection. The attack may be performed from a remote location. The exploit is now public and may be used.
References
Link Resource
https://github.com/ganzhi-qcy/cve/issues/16 Exploit Issue Tracking Third Party Advisory
https://vuldb.com/?ctiid.321919 Permissions Required VDB Entry
https://vuldb.com/?id.321919 Third Party Advisory VDB Entry
https://vuldb.com/?submit.639171 Third Party Advisory VDB Entry
https://www.sourcecodester.com/ Product
https://github.com/ganzhi-qcy/cve/issues/16 Exploit Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:razormist:online_polling_system:1.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-08-30 17:15

Updated : 2025-09-08 16:52


NVD link : CVE-2025-9699

Mitre link : CVE-2025-9699

CVE.ORG link : CVE-2025-9699


JSON object : View

Products Affected

razormist

  • online_polling_system
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')