{"id":29892,"date":"2025-04-23T17:57:23","date_gmt":"2025-04-23T17:57:23","guid":{"rendered":""},"modified":"2025-05-15T23:18:18","modified_gmt":"2025-05-15T23:18:18","slug":"cve-2024-40073-critical-sql-injection-vulnerability-in-sourcecodester-online-id-generator-system-1-0","status":"publish","type":"post","link":"https:\/\/www.ameeba.com\/blog\/cve-2024-40073-critical-sql-injection-vulnerability-in-sourcecodester-online-id-generator-system-1-0\/","title":{"rendered":"<strong>CVE-2024-40073: Critical SQL Injection Vulnerability in Sourcecodester Online ID Generator System 1.0<\/strong>"},"content":{"rendered":"<p><strong>Overview<\/strong><\/p>\n<p>A high severity vulnerability, CVE-2024-40073, has been identified in the Sourcecodester Online ID Generator System 1.0. The vulnerability is a SQL injection flaw that can allow potential attackers to compromise the system and cause data leakage. Given the CVSS Severity Score of 9.8, this issue requires immediate attention and mitigation. Businesses using the affected version of the <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2024-40071-arbitrary-file-upload-vulnerability-in-sourcecodester-online-id-generator-system-1-0\/\"  data-wpil-monitor-id=\"36560\">Online ID Generator should act promptly to protect their systems<\/a> and data.<\/p>\n<p><strong>Vulnerability Summary<\/strong><\/p>\n<p>CVE ID: CVE-2024-40073<br \/>\nSeverity: Critical (CVSS: 9.8)<br \/>\nAttack Vector: Network<br \/>\nPrivileges Required: None<br \/>\nUser Interaction: None<br \/>\nImpact: <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-22900-stack-overflow-vulnerability-in-totolink-n600r-leading-to-potential-system-compromise\/\"  data-wpil-monitor-id=\"35177\">System compromise and potential<\/a> data leakage<\/p>\n<p><strong>Affected Products<\/strong><\/p><div id=\"ameeb-3585558096\" class=\"ameeb-content-2 ameeb-entity-placement\"><div style=\"border-left: 4px solid #555; padding-left: 20px; margin: 48px 0; font-family: Roboto, sans-serif; color: #ffffff; line-height: 1.6; max-width: 700px;\">\r\n  <h2 style=\"margin-top: 0; font-size: 20px; font-weight: 600; display: flex; align-items: center;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"display: inline-flex; align-items: center; margin-right: 8px;\">\r\n      <img decoding=\"async\" src=\"https:\/\/www.ameeba.com\/blog\/wp-content\/uploads\/2025\/10\/Best-App-icon-Ameeba.png\" alt=\"Ameeba Chat Icon\" style=\"width: 40px; height: 40px;\" \/>\r\n    <\/a>\r\n    A new way to communicate\r\n  <\/h2>\r\n\r\n  <p style=\"margin-bottom: 12px;\">\r\n    Ameeba Chat is built on encrypted identity, not personal profiles.\r\n  <\/p>\r\n\r\n  <p style=\"margin-bottom: 16px;\">\r\n    Message, call, share files, and coordinate with identities kept separate.\r\n  <\/p>\r\n\r\n  <ul style=\"list-style: none; padding-left: 0; margin-bottom: 20px;\">\r\n    <li>\u2022 Encrypted identity<\/li>\r\n    <li>\u2022 Ameeba Chat authenticates access<\/li>\r\n    <li>\u2022 Aliases and categories<\/li>\r\n    <li>\u2022 End-to-end encrypted chat, calls, and files<\/li>\r\n    <li>\u2022 Secure notes for sensitive information<\/li>\r\n  <\/ul>\r\n\r\n  <p style=\"font-style: italic; font-weight: 600; margin-bottom: 24px;\">\r\n    Private communication, rethought.\r\n  <\/p>\r\n\r\n  <div style=\"display: flex; flex-wrap: wrap; gap: 12px;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\/download\" style=\"background-color: #ffffff; color: #000000; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Download Ameeba Chat<\/a>\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"border: 1px solid #ffffff; color: #ffffff; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Learn More<\/a>\r\n  <\/div>\r\n<\/div>\r\n<\/div>\n<p>Product | Affected Versions<\/p>\n<p><a href=\"https:\/\/www.ameeba.com\/blog\/cve-2024-40072-high-risk-sql-injection-vulnerability-in-sourcecodester-online-id-generator-system-1-0\/\"  data-wpil-monitor-id=\"36207\">Sourcecodester Online ID Generator System<\/a> | 1.0<\/p>\n<p><strong>How the Exploit Works<\/strong><\/p>\n<p>The vulnerability resides in the template parameter of the `id_generator\/admin\/?page=generate&#038;template=4` functionality of the <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-2007-wordpress-plugin-vulnerability-leads-to-arbitrary-file-deletion-and-potential-system-compromise\/\"  data-wpil-monitor-id=\"34594\">Sourcecodester Online ID Generator System<\/a> 1.0. Attackers can exploit this flaw by <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-32618-sql-injection-vulnerability-in-pickplugins-wishlist\/\"  data-wpil-monitor-id=\"34087\">injecting malicious SQL<\/a> code into the template parameter. Given the lack of proper sanitization or validation of this parameter, the <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2023-44755-critical-sql-injection-vulnerability-in-sacco-management-system-v1-0\/\"  data-wpil-monitor-id=\"39594\">system executes the malicious SQL<\/a> statement. This can lead to <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-26733-unauthorized-access-vulnerability-in-shinetheme-traveler-software\/\"  data-wpil-monitor-id=\"34225\">unauthorized access<\/a>, data modification or even full system compromise depending on the underlying database permissions.<\/p>\n<p><strong>Conceptual Example Code<\/strong><\/p><div id=\"ameeb-3099740398\" class=\"ameeb-content ameeb-entity-placement\"><div class=\"poptin-embedded\" data-id=\"f6b387694f681\"><\/div>\r\n\r\n\r\n\r\n\r\n\r\n<\/div>\n<p>Here&#8217;s a conceptual example of how the <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2023-50123-exploitable-vulnerability-in-hozard-alarm-system-sms-authentication\/\"  data-wpil-monitor-id=\"34907\">vulnerability might be exploited<\/a> via a malicious HTTP GET request:<\/p>\n<pre><code class=\"\" data-line=\"\">GET \/id_generator\/admin\/?page=generate&amp;template=1 OR 1=1; DROP TABLE users; -- HTTP\/1.1\nHost: target.example.com<\/code><\/pre>\n<p>In this example, `1 OR 1=1` is a classic <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-32119-blind-sql-injection-vulnerability-in-cardgate-payments-for-woocommerce-plugin\/\"  data-wpil-monitor-id=\"34566\">SQL Injection<\/a> payload which always evaluates to true. The `DROP TABLE users;` command is an example of a destructive action a malicious actor might take &#8211; <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-3065-arbitrary-file-deletion-vulnerability-in-database-toolset-plugin\/\"  data-wpil-monitor-id=\"40269\">deleting a users database<\/a>.<\/p>\n<p><strong>Mitigation<\/strong><\/p>\n<p>To mitigate this vulnerability, users are advised to apply the vendor&#8217;s patch as soon as possible. If the patch cannot be applied immediately, using a Web Application Firewall (WAF) or an Intrusion Detection System (IDS) can temporarily mitigate the risk by <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2023-38657-out-of-bounds-write-vulnerability-in-gtkwave-lxt2-zlib-block-decompression\/\"  data-wpil-monitor-id=\"43175\">blocking or alerting on attempted exploits of the vulnerability<\/a>. Furthermore, it is recommended to review the <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-30727-unpatched-vulnerability-in-oracle-scripting-leads-to-potential-system-compromise\/\"  data-wpil-monitor-id=\"35767\">system&#8217;s codebase for other potential<\/a> injection points and to ensure input validation and sanitization are correctly implemented across the application.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview A high severity vulnerability, CVE-2024-40073, has been identified in the Sourcecodester Online ID Generator System 1.0. The vulnerability is a SQL injection flaw that can allow potential attackers to compromise the system and cause data leakage. Given the CVSS Severity Score of 9.8, this issue requires immediate attention and mitigation. Businesses using the affected [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"footnotes":""},"categories":[1],"tags":[],"vendor":[],"product":[],"attack_vector":[74],"asset_type":[],"severity":[],"exploit_status":[],"class_list":["post-29892","post","type-post","status-publish","format-standard","hentry","category-uncategorized","attack_vector-sql-injection"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/29892","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/comments?post=29892"}],"version-history":[{"count":12,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/29892\/revisions"}],"predecessor-version":[{"id":38525,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/29892\/revisions\/38525"}],"wp:attachment":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/media?parent=29892"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/categories?post=29892"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/tags?post=29892"},{"taxonomy":"vendor","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/vendor?post=29892"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/product?post=29892"},{"taxonomy":"attack_vector","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/attack_vector?post=29892"},{"taxonomy":"asset_type","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/asset_type?post=29892"},{"taxonomy":"severity","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/severity?post=29892"},{"taxonomy":"exploit_status","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/exploit_status?post=29892"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}