CVE-2025-15353

A vulnerability was detected in itsourcecode Society Management System 1.0. Impacted is the function edit_admin_query of the file /admin/edit_admin_query.php. Performing manipulation of the argument Username results in sql injection. It is possible to initiate the attack remotely. The exploit is now public and may be used.
References
Link Resource
https://github.com/BUPT2025201/CVE/issues/4 Exploit Issue Tracking Third Party Advisory
https://itsourcecode.com/ Product
https://vuldb.com/?ctiid.338740 Permissions Required VDB Entry
https://vuldb.com/?id.338740 Third Party Advisory VDB Entry
https://vuldb.com/?submit.726280 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:angeljudesuarez:society_management_system:1.0:*:*:*:*:*:*:*

History

02 Jan 2026, 14:04

Type Values Removed Values Added
CPE cpe:2.3:a:angeljudesuarez:society_management_system:1.0:*:*:*:*:*:*:*
First Time Angeljudesuarez
Angeljudesuarez society Management System
References () https://github.com/BUPT2025201/CVE/issues/4 - () https://github.com/BUPT2025201/CVE/issues/4 - Exploit, Issue Tracking, Third Party Advisory
References () https://itsourcecode.com/ - () https://itsourcecode.com/ - Product
References () https://vuldb.com/?ctiid.338740 - () https://vuldb.com/?ctiid.338740 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.338740 - () https://vuldb.com/?id.338740 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.726280 - () https://vuldb.com/?submit.726280 - Third Party Advisory, VDB Entry

30 Dec 2025, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-30 20:15

Updated : 2026-01-02 14:04


NVD link : CVE-2025-15353

Mitre link : CVE-2025-15353

CVE.ORG link : CVE-2025-15353


JSON object : View

Products Affected

angeljudesuarez

  • society_management_system
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')