Skip to main content

CVE-2025-10102: SQL Injection in code-projects Online Event Judging System

Medium
VulnerabilityCVE-2025-10102cvecve-2025-10102
Published: Mon Sep 08 2025 (09/08/2025, 18:32:09 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Online Event Judging System

Description

A security flaw has been discovered in code-projects Online Event Judging System 1.0. This affects an unknown function of the file /index.php. Performing manipulation of the argument Username results in sql injection. The attack is possible to be carried out remotely. The exploit has been released to the public and may be exploited.

AI-Powered Analysis

AILast updated: 09/08/2025, 19:01:24 UTC

Technical Analysis

CVE-2025-10102 is a SQL Injection vulnerability identified in version 1.0 of the code-projects Online Event Judging System, specifically within an unspecified function in the /index.php file. The vulnerability arises from improper sanitization or validation of the 'Username' parameter, which can be manipulated by an attacker to inject malicious SQL code. This injection flaw allows an unauthenticated remote attacker to execute arbitrary SQL commands on the backend database without requiring any user interaction or privileges. The CVSS 4.0 base score of 6.9 (medium severity) reflects the network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and partial impacts on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). The vulnerability does not affect system confidentiality, integrity, or availability completely but can lead to unauthorized data access, data modification, or partial disruption of service. Although no public exploit is currently known to be actively used in the wild, proof-of-concept code has been released, increasing the risk of exploitation. The affected product is an online event judging system, which is likely used by organizations to manage and score events or competitions. The vulnerability in the core authentication or user input handling component could allow attackers to extract sensitive user data, manipulate event results, or disrupt event operations remotely, potentially undermining trust and operational integrity of the affected systems.

Potential Impact

For European organizations using the code-projects Online Event Judging System 1.0, this vulnerability poses a significant risk to the confidentiality and integrity of event-related data. Attackers exploiting this flaw could gain unauthorized access to user credentials, manipulate judging scores, or extract sensitive participant information. This could lead to reputational damage, loss of trust among event participants, and potential legal consequences under GDPR due to unauthorized data exposure. The availability impact, while partial, could disrupt event operations, causing delays or cancellations. Given that the exploit requires no authentication or user interaction and can be executed remotely, the threat is substantial, especially for organizations relying on this system for critical event management. The medium severity rating suggests that while the vulnerability is serious, it may not lead to full system compromise but still warrants urgent attention to prevent data breaches or operational disruptions.

Mitigation Recommendations

Organizations should immediately assess their use of the code-projects Online Event Judging System version 1.0 and prioritize upgrading to a patched version once available. In the absence of an official patch, implement input validation and parameterized queries or prepared statements to sanitize the 'Username' input and prevent SQL injection. Employ web application firewalls (WAFs) configured to detect and block SQL injection patterns targeting the /index.php endpoint. Conduct thorough code reviews and penetration testing focusing on user input handling. Restrict database permissions for the application to the minimum necessary to limit the impact of potential exploitation. Monitor logs for suspicious activities related to SQL injection attempts and unusual database queries. Additionally, consider isolating the judging system within a segmented network zone to reduce exposure. Finally, prepare an incident response plan to quickly address any exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-08T13:43:17.372Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68bf2487d5a2966cfc8267e8

Added to database: 9/8/2025, 6:46:31 PM

Last enriched: 9/8/2025, 7:01:24 PM

Last updated: 9/10/2025, 4:07:21 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats