CVE-2025-10878

Fikir Odalari · AdminPando

A critical SQL injection vulnerability in Fikir Odalari AdminPando allows unauthenticated attackers to bypass login and gain full administrative access, including DOM manipulation capabilities.

Executive summary

Fikir Odalari AdminPando is affected by a maximum-severity SQL injection vulnerability that allows unauthenticated attackers to seize full administrative control and deface public content.

Vulnerability

The username and password parameters in the login functionality are susceptible to SQL injection. An unauthenticated attacker can use crafted SQL queries to bypass the authentication mechanism entirely.

Business impact

This vulnerability carries a CVSS score of 10.0, representing the highest possible risk. Successful exploitation allows an attacker to gain full administrative privileges, enabling them to manipulate the underlying database, steal user information, and modify the public-facing website’s HTML/DOM. This can lead to massive reputational damage and total loss of data confidentiality.

Remediation

Immediate Action: Apply the vendor-provided patch released on or after January 26, 2026, which implements prepared statements and input sanitization.

Proactive Monitoring: Review database logs for suspicious queries containing SQL keywords like UNION, SELECT, or ' OR '1'='1'.

Compensating Controls: Implement a Web Application Firewall (WAF) with aggressive SQL injection protection profiles to intercept malicious login attempts.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Immediate patching is mandatory for all AdminPando installations. Because this flaw allows for complete system takeover and public website manipulation, administrators should also conduct a forensic audit to ensure the system has not already been compromised via this vector.