CVE-2025-10405
itsourcecode · itsourcecode Baptism Information Management System
A high-severity vulnerability has been identified in the itsourcecode Baptism Information Management System.
Executive summary
A high-severity vulnerability has been identified in the itsourcecode Baptism Information Management System. This flaw could allow a remote, unauthenticated attacker to access and manipulate sensitive data within the application's database, potentially leading to a significant data breach. Organizations are urged to apply the vendor-provided security patches immediately to mitigate the risk of exploitation.
Vulnerability
The vulnerability resides in how the application processes user-supplied input without proper sanitization, leading to a pre-authentication SQL injection flaw. An unauthenticated attacker can send a specially crafted request to a vulnerable endpoint, such as the login form or a public search feature. By embedding malicious SQL commands within the request parameters, the attacker can bypass authentication controls and execute arbitrary queries against the back-end database, allowing them to read, modify, or delete sensitive records.
Business impact
This vulnerability is rated as High severity with a CVSS score of 7.3. Successful exploitation could result in a significant data breach, exposing sensitive Personally Identifiable Information (PII) managed by the system, such as names, dates of birth, and family details. The consequences include severe reputational damage, loss of trust from stakeholders, and potential legal and regulatory penalties for non-compliance with data protection standards. The direct access to the database could also be leveraged to disrupt system availability or integrity.
Remediation
Immediate Action: Apply vendor security updates immediately to patch the vulnerability. After patching, it is critical to monitor for any signs of post-patch exploitation attempts and thoroughly review historical access logs for indicators of a prior compromise.
Proactive Monitoring:
Implement enhanced monitoring of web server and database logs. Specifically, look for unusual or malformed SQL queries, a high volume of requests to specific application endpoints, and web access logs showing common SQL injection payloads (e.g., containing UNION, SELECT, --, or ' OR '1'='1'). Utilize a Web Application Firewall (WAF) to detect and block such malicious requests.
Compensating Controls: If immediate patching is not feasible, implement a Web Application Firewall (WAF) with a strict ruleset designed to block SQL injection attacks. Additionally, restrict network access to the application, allowing connections only from trusted IP addresses or internal networks. Enforce the principle of least privilege for the database user account associated with the application to limit the potential impact of a successful exploit.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Given the High severity rating (CVSS 7.3) and the risk of a sensitive data breach, this vulnerability requires immediate attention. Organizations must prioritize applying the vendor-supplied patch across all affected systems. Although this CVE is not currently listed on the CISA KEV catalog, its potential for unauthorized data access presents a critical risk. If patching cannot be performed immediately, the compensating controls outlined above, particularly the deployment of a WAF, should be implemented as an urgent mitigating action.