CVE-2025-9953
SQL Injection Authorization Bypass in Databank Accreditation Software
Publication date: 2026-02-19
Last updated on: 2026-02-19
Assigner: Computer Emergency Response Team of the Republic of Turkey
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| database_software_training_consulting_ltd | databank_accreditation_software | to 19022026 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-566 | The product uses a database table that includes records that should not be accessible to an actor, but it executes a SQL statement with a primary key that can be controlled by that actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an Authorization Bypass Through User-Controlled SQL Primary Key in the Databank Accreditation Software by DATABASE Software Training Consulting Ltd. It allows an attacker to perform SQL Injection by manipulating the SQL primary key, which is user-controlled. This means unauthorized users can bypass normal authorization checks and potentially access or modify data they should not be able to.
How can this vulnerability impact me? :
The impact of this vulnerability is severe. Because it allows SQL Injection and authorization bypass, an attacker can gain unauthorized access to sensitive data, modify or delete data, and disrupt the availability of the system. The CVSS score of 9.8 indicates a critical severity with high impact on confidentiality, integrity, and availability.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know