CVE-2025-9953
Awaiting Analysis Awaiting Analysis - Queue
SQL Injection Authorization Bypass in Databank Accreditation Software

Publication date: 2026-02-19

Last updated on: 2026-02-19

Assigner: Computer Emergency Response Team of the Republic of Turkey

Description
Authorization Bypass Through User-Controlled SQL Primary Key vulnerability in DATABASE Software Training Consulting Ltd. Databank Accreditation Software allows SQL Injection.This issue affects Databank Accreditation Software: through 19022026. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-19
Last Modified
2026-02-19
Generated
2026-05-07
AI Q&A
2026-02-19
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
database_software_training_consulting_ltd databank_accreditation_software to 19022026 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-566 The product uses a database table that includes records that should not be accessible to an actor, but it executes a SQL statement with a primary key that can be controlled by that actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is an Authorization Bypass Through User-Controlled SQL Primary Key in the Databank Accreditation Software by DATABASE Software Training Consulting Ltd. It allows an attacker to perform SQL Injection by manipulating the SQL primary key, which is user-controlled. This means unauthorized users can bypass normal authorization checks and potentially access or modify data they should not be able to.


How can this vulnerability impact me? :

The impact of this vulnerability is severe. Because it allows SQL Injection and authorization bypass, an attacker can gain unauthorized access to sensitive data, modify or delete data, and disrupt the availability of the system. The CVSS score of 9.8 indicates a critical severity with high impact on confidentiality, integrity, and availability.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

I don't know


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart