CVE-2025-9706

A security vulnerability has been detected in SourceCodester Water Billing System 1.0. Affected by this vulnerability is an unknown functionality of the file /edit.php. Such manipulation of the argument ID leads to sql injection. The attack can be executed remotely. The exploit has been disclosed publicly and may be used.
References
Link Resource
https://github.com/0510green-hand/cve/issues/9 Exploit Issue Tracking Third Party Advisory
https://vuldb.com/?ctiid.321927 Permissions Required VDB Entry
https://vuldb.com/?id.321927 Third Party Advisory VDB Entry
https://vuldb.com/?submit.639228 Third Party Advisory VDB Entry
https://www.sourcecodester.com/ Product
https://github.com/0510green-hand/cve/issues/9 Exploit Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:janobe:water_billing_system:1.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-08-30 22:15

Updated : 2025-09-08 16:51


NVD link : CVE-2025-9706

Mitre link : CVE-2025-9706

CVE.ORG link : CVE-2025-9706


JSON object : View

Products Affected

janobe

  • water_billing_system
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')