CVE-2023-45118: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Projectworlds Pvt. Limited Online Examination System
Online Examination System v1.0 is vulnerable to multiple Authenticated SQL Injection vulnerabilities. The 'fdid' parameter of the /update.php resource does not validate the characters received and they are sent unfiltered to the database.
AI Analysis
Technical Summary
CVE-2023-45118 is a high-severity SQL Injection vulnerability affecting version 1.0 of the Online Examination System developed by Projectworlds Pvt. Limited. The vulnerability arises from improper neutralization of special elements used in SQL commands (CWE-89). Specifically, the 'fdid' parameter in the /update.php endpoint does not properly validate or sanitize input before incorporating it into SQL queries. This flaw allows an authenticated attacker with at least limited privileges (PR:L) to inject malicious SQL code, potentially leading to unauthorized data access, data modification, or complete compromise of the underlying database. The vulnerability has a CVSS 3.1 base score of 8.8, reflecting its high impact on confidentiality, integrity, and availability, with network attack vector (AV:N), low attack complexity (AC:L), no user interaction (UI:N), and unchanged scope (S:U). Although no public exploits have been reported yet, the vulnerability's characteristics make it a significant risk, especially in environments where the Online Examination System is used to manage sensitive educational or examination data. The lack of input validation on the 'fdid' parameter means attackers can craft SQL payloads to extract sensitive information, alter exam results, or disrupt system operations, potentially undermining the integrity of examination processes.
Potential Impact
For European organizations, particularly educational institutions and certification bodies using the affected Online Examination System, this vulnerability poses a serious threat. Exploitation could lead to unauthorized disclosure of personal data of students and staff, manipulation of exam results, and disruption of examination services. Such impacts could violate GDPR requirements concerning data protection and integrity, leading to regulatory penalties and reputational damage. The compromise of examination data can undermine trust in academic credentials and certification processes, affecting both individuals and institutions. Additionally, the availability impact could disrupt critical examination schedules, causing operational and financial consequences. Given the authenticated nature of the vulnerability, insider threats or compromised user accounts could be leveraged to exploit this flaw, increasing the risk profile for organizations with less stringent access controls.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately implement strict input validation and sanitization on the 'fdid' parameter and any other user-supplied inputs before they are used in SQL queries. Employing parameterized queries or prepared statements is essential to prevent SQL injection attacks. Since no official patches are currently available, organizations should consider applying virtual patching via Web Application Firewalls (WAFs) configured to detect and block SQL injection patterns targeting the vulnerable parameter. Additionally, review and tighten user access controls to limit the number of users with privileges to access the /update.php resource. Monitoring database and application logs for unusual query patterns or failed injection attempts can provide early detection of exploitation attempts. Organizations should also plan for timely updates once vendor patches become available and conduct security assessments to identify similar vulnerabilities in other parts of the application.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2023-45118: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Projectworlds Pvt. Limited Online Examination System
Description
Online Examination System v1.0 is vulnerable to multiple Authenticated SQL Injection vulnerabilities. The 'fdid' parameter of the /update.php resource does not validate the characters received and they are sent unfiltered to the database.
AI-Powered Analysis
Technical Analysis
CVE-2023-45118 is a high-severity SQL Injection vulnerability affecting version 1.0 of the Online Examination System developed by Projectworlds Pvt. Limited. The vulnerability arises from improper neutralization of special elements used in SQL commands (CWE-89). Specifically, the 'fdid' parameter in the /update.php endpoint does not properly validate or sanitize input before incorporating it into SQL queries. This flaw allows an authenticated attacker with at least limited privileges (PR:L) to inject malicious SQL code, potentially leading to unauthorized data access, data modification, or complete compromise of the underlying database. The vulnerability has a CVSS 3.1 base score of 8.8, reflecting its high impact on confidentiality, integrity, and availability, with network attack vector (AV:N), low attack complexity (AC:L), no user interaction (UI:N), and unchanged scope (S:U). Although no public exploits have been reported yet, the vulnerability's characteristics make it a significant risk, especially in environments where the Online Examination System is used to manage sensitive educational or examination data. The lack of input validation on the 'fdid' parameter means attackers can craft SQL payloads to extract sensitive information, alter exam results, or disrupt system operations, potentially undermining the integrity of examination processes.
Potential Impact
For European organizations, particularly educational institutions and certification bodies using the affected Online Examination System, this vulnerability poses a serious threat. Exploitation could lead to unauthorized disclosure of personal data of students and staff, manipulation of exam results, and disruption of examination services. Such impacts could violate GDPR requirements concerning data protection and integrity, leading to regulatory penalties and reputational damage. The compromise of examination data can undermine trust in academic credentials and certification processes, affecting both individuals and institutions. Additionally, the availability impact could disrupt critical examination schedules, causing operational and financial consequences. Given the authenticated nature of the vulnerability, insider threats or compromised user accounts could be leveraged to exploit this flaw, increasing the risk profile for organizations with less stringent access controls.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately implement strict input validation and sanitization on the 'fdid' parameter and any other user-supplied inputs before they are used in SQL queries. Employing parameterized queries or prepared statements is essential to prevent SQL injection attacks. Since no official patches are currently available, organizations should consider applying virtual patching via Web Application Firewalls (WAFs) configured to detect and block SQL injection patterns targeting the vulnerable parameter. Additionally, review and tighten user access controls to limit the number of users with privileges to access the /update.php resource. Monitoring database and application logs for unusual query patterns or failed injection attempts can provide early detection of exploitation attempts. Organizations should also plan for timely updates once vendor patches become available and conduct security assessments to identify similar vulnerabilities in other parts of the application.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Fluid Attacks
- Date Reserved
- 2023-10-04T14:28:12.264Z
- Cisa Enriched
- false
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f81484d88663aeb7d4
Added to database: 5/20/2025, 6:59:04 PM
Last enriched: 7/4/2025, 2:56:35 PM
Last updated: 8/16/2025, 1:42:35 AM
Views: 22
Related Threats
CVE-2025-9095: Cross Site Scripting in ExpressGateway express-gateway
MediumCVE-2025-7342: CWE-798 Use of Hard-coded Credentials in Kubernetes Image Builder
HighCVE-2025-9094: Improper Neutralization of Special Elements Used in a Template Engine in ThingsBoard
MediumCVE-2025-9093: Improper Export of Android Application Components in BuzzFeed App
MediumResearcher to release exploit for full auth bypass on FortiWeb
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.