CVE-2025-5329

Martcode Software Inc. · Delta Course Automation

Delta Course Automation is vulnerable to a critical SQL Injection flaw that allows attackers to manipulate database commands. The vendor has not responded to disclosure attempts.

Executive summary

A critical SQL Injection vulnerability in Delta Course Automation allows unauthenticated attackers to access, modify, or delete sensitive database information, potentially leading to full system compromise.

Vulnerability

The application fails to properly neutralize special elements in SQL commands, resulting in a classic SQL Injection (SQLi) vulnerability. This allows an unauthenticated attacker to execute arbitrary SQL queries against the backend database.

Business impact

With a CVSS score of 9.8, the impact is severe. An attacker can steal student records, financial data, and administrative credentials. Furthermore, depending on the database configuration, SQL injection can sometimes be escalated to full remote code execution on the database server.

Remediation

Immediate Action: Since the vendor has not responded, administrators should immediately apply a Web Application Firewall (WAF) with strict SQLi protection rules to shield the application.

Proactive Monitoring: Closely monitor database logs for anomalous queries, rapid data exfiltration patterns, or unauthorized administrative account creation.

Compensating Controls: Implement the principle of least privilege for the database user account and ensure the application is not running with DBA or root permissions.

Exploitation status

Public Exploit Available: false

Analyst recommendation

The lack of a vendor patch makes this a high-risk situation. Organizations must rely on robust perimeter defenses like WAFs and should consider migrating to a supported platform if the vendor remains unresponsive to security disclosures.