Cyber Posture

CVE-2025-65133

Critical

Published: 14 April 2026

Published
14 April 2026
Modified
17 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0020 42.0th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

A SQL injection vulnerability exists in the School Management System (version 1.0) by manikandan580. An unauthenticated or authenticated remote attacker can supply a crafted HTTP request to the affected endpoint to manipulate SQL query logic and extract sensitive database information.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly prevents SQL injection by validating crafted HTTP request inputs at the affected endpoint to ensure they conform to expected formats and reject malicious payloads.

prevent

Enforces restrictions such as length limits and allowed character sets on HTTP inputs to block SQL injection attempts manipulating query logic.

prevent

Requires timely identification, reporting, and patching of the specific SQL injection flaw in School Management System version 1.0 to eliminate the vulnerability.

Security SummaryAI

CVE-2025-65133 is a SQL injection vulnerability (CWE-89) affecting the School Management System version 1.0 developed by manikandan580. Published on 2026-04-14, it allows attackers to manipulate SQL query logic through a crafted HTTP request to an affected endpoint. The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its potential for high impact on confidentiality, integrity, and availability.

Unauthenticated or authenticated remote attackers can exploit this vulnerability over the network with low complexity and no user interaction required. By sending a specially crafted HTTP request, attackers can extract sensitive database information, potentially enabling further compromise such as data exfiltration, modification, or denial of service.

Advisories detailing the issue, including a README and proof-of-concept, are available in the TREXNEGRO Security-Advisories GitHub repository at the referenced URLs. No specific patches or mitigations are detailed in the provided information.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1213.006 Databases Collection
Adversaries may leverage databases to mine valuable information.
Why these techniques?

SQL injection vulnerability in public-facing web application directly enables T1190 (Exploit Public-Facing Application) and facilitates unauthorized database access and extraction of sensitive information via T1213.006 (Data from Information Repositories: Databases).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References