CVE-2025-10404
itsourcecode · itsourcecode Baptism Information Management System
A high-severity vulnerability has been identified in the itsourcecode Baptism Information Management System.
Executive summary
A high-severity vulnerability has been identified in the itsourcecode Baptism Information Management System. This flaw could allow a remote attacker to access and exfiltrate sensitive personal information from the system's database. Organizations using the affected software are exposed to a significant risk of a data breach, which could lead to reputational damage and regulatory penalties.
Vulnerability
The vulnerability is a SQL Injection flaw within a component of the web-based management interface. An unauthenticated remote attacker can exploit this by sending a specially crafted request to the application. By embedding malicious SQL commands into user-supplied input fields, the attacker can manipulate the database queries executed by the backend, bypassing security controls to read, modify, or delete sensitive data stored in the database.
Business impact
This vulnerability is rated as High severity with a CVSS score of 7.3. Successful exploitation could lead to a significant data breach, resulting in the unauthorized disclosure of sensitive Personally Identifiable Information (PII) managed by the system. The potential consequences include loss of member trust, reputational harm to the organization, and potential legal or regulatory fines for non-compliance with data protection standards. The direct operational impact could include data corruption or loss, requiring significant effort for recovery and incident response.
Remediation
Immediate Action: Identify all instances of the affected software and apply the security updates provided by the vendor immediately. After patching, it is critical to monitor for any signs of post-patch exploitation attempts and review historical access and database logs for indicators of a prior compromise.
Proactive Monitoring: Implement enhanced monitoring of web server and database logs. Specifically, look for unusual or malformed SQL queries, a high volume of errors originating from a single IP address, and web requests containing SQL keywords such as UNION, SELECT, --, or '. Monitor for unexpected outbound network traffic from the database server.
Compensating Controls: If immediate patching is not feasible, implement a Web Application Firewall (WAF) with rulesets designed to detect and block SQL Injection attacks. Restrict network access to the application's management interface to only trusted IP addresses and enforce the principle of least privilege for the database service account used by the application.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Given the high severity (CVSS 7.3) and the risk of a sensitive data breach, this vulnerability requires immediate attention. Although it is not currently listed on the CISA KEV list and no active exploitation has been observed, the potential impact is significant. We strongly recommend that the organization prioritizes the immediate deployment of the vendor-supplied security patches to all affected systems. In parallel, implement the suggested compensating controls and proactive monitoring to reduce the attack surface and improve detection capabilities.