CVE-2025-10104: SQL Injection in code-projects Online Event Judging System
A security vulnerability has been detected in code-projects Online Event Judging System 1.0. Affected is an unknown function of the file /review_search.php. The manipulation of the argument txtsearch leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used.
AI Analysis
Technical Summary
CVE-2025-10104 is a SQL Injection vulnerability identified in version 1.0 of the code-projects Online Event Judging System, specifically within an unspecified function in the /review_search.php file. The vulnerability arises from improper sanitization or validation of the 'txtsearch' parameter, which is used in SQL queries. An attacker can remotely exploit this flaw by manipulating the 'txtsearch' argument to inject malicious SQL code. This injection can lead to unauthorized access to the backend database, allowing attackers to read, modify, or delete data, potentially compromising the confidentiality, integrity, and availability of the system's data. The vulnerability does not require authentication or user interaction, making it easier to exploit. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the network attack vector, low attack complexity, no privileges or user interaction required, and limited impact on confidentiality, integrity, and availability. Although no public exploits are currently known in the wild, the vulnerability has been publicly disclosed, increasing the risk of exploitation by threat actors. The lack of available patches or mitigations from the vendor further elevates the urgency for organizations using this software to implement protective measures.
Potential Impact
For European organizations utilizing the code-projects Online Event Judging System 1.0, this vulnerability poses a significant risk. Exploitation could lead to unauthorized disclosure of sensitive event judging data, manipulation of event results, or disruption of event operations. This can damage organizational reputation, lead to loss of trust among stakeholders, and potentially cause regulatory compliance issues under GDPR if personal or sensitive data is exposed. The remote and unauthenticated nature of the exploit increases the likelihood of attacks, especially in environments where the system is accessible over the internet. Additionally, if the system integrates with other internal platforms, the SQL injection could serve as a pivot point for broader network compromise. The medium severity rating indicates a moderate but tangible threat that should not be underestimated, particularly for organizations relying heavily on the integrity and availability of event judging processes.
Mitigation Recommendations
Given the absence of official patches, European organizations should immediately implement the following mitigations: 1) Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the 'txtsearch' parameter in /review_search.php. 2) Restrict network access to the Online Event Judging System by limiting exposure to trusted IP addresses or internal networks only, reducing the attack surface. 3) Conduct thorough input validation and sanitization at the application level, if source code access is available, to neutralize malicious inputs. 4) Monitor logs for unusual query patterns or repeated failed attempts to exploit the 'txtsearch' parameter. 5) Consider deploying database-level protections such as least privilege accounts for the application and query parameterization to mitigate injection risks. 6) Plan for an urgent update or migration to a patched version once available from the vendor. 7) Educate relevant IT and security staff about this vulnerability and ensure incident response plans include detection and containment strategies for SQL injection attacks.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium
CVE-2025-10104: SQL Injection in code-projects Online Event Judging System
Description
A security vulnerability has been detected in code-projects Online Event Judging System 1.0. Affected is an unknown function of the file /review_search.php. The manipulation of the argument txtsearch leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-10104 is a SQL Injection vulnerability identified in version 1.0 of the code-projects Online Event Judging System, specifically within an unspecified function in the /review_search.php file. The vulnerability arises from improper sanitization or validation of the 'txtsearch' parameter, which is used in SQL queries. An attacker can remotely exploit this flaw by manipulating the 'txtsearch' argument to inject malicious SQL code. This injection can lead to unauthorized access to the backend database, allowing attackers to read, modify, or delete data, potentially compromising the confidentiality, integrity, and availability of the system's data. The vulnerability does not require authentication or user interaction, making it easier to exploit. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the network attack vector, low attack complexity, no privileges or user interaction required, and limited impact on confidentiality, integrity, and availability. Although no public exploits are currently known in the wild, the vulnerability has been publicly disclosed, increasing the risk of exploitation by threat actors. The lack of available patches or mitigations from the vendor further elevates the urgency for organizations using this software to implement protective measures.
Potential Impact
For European organizations utilizing the code-projects Online Event Judging System 1.0, this vulnerability poses a significant risk. Exploitation could lead to unauthorized disclosure of sensitive event judging data, manipulation of event results, or disruption of event operations. This can damage organizational reputation, lead to loss of trust among stakeholders, and potentially cause regulatory compliance issues under GDPR if personal or sensitive data is exposed. The remote and unauthenticated nature of the exploit increases the likelihood of attacks, especially in environments where the system is accessible over the internet. Additionally, if the system integrates with other internal platforms, the SQL injection could serve as a pivot point for broader network compromise. The medium severity rating indicates a moderate but tangible threat that should not be underestimated, particularly for organizations relying heavily on the integrity and availability of event judging processes.
Mitigation Recommendations
Given the absence of official patches, European organizations should immediately implement the following mitigations: 1) Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the 'txtsearch' parameter in /review_search.php. 2) Restrict network access to the Online Event Judging System by limiting exposure to trusted IP addresses or internal networks only, reducing the attack surface. 3) Conduct thorough input validation and sanitization at the application level, if source code access is available, to neutralize malicious inputs. 4) Monitor logs for unusual query patterns or repeated failed attempts to exploit the 'txtsearch' parameter. 5) Consider deploying database-level protections such as least privilege accounts for the application and query parameterization to mitigate injection risks. 6) Plan for an urgent update or migration to a patched version once available from the vendor. 7) Educate relevant IT and security staff about this vulnerability and ensure incident response plans include detection and containment strategies for SQL injection attacks.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-08T13:43:23.168Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68bf399cd5a2966cfc830bfd
Added to database: 9/8/2025, 8:16:28 PM
Last enriched: 9/8/2025, 8:31:22 PM
Last updated: 9/10/2025, 4:07:21 AM
Views: 9
Related Threats
CVE-2025-8388: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ideaboxcreations PowerPack Elementor Addons (Free Widgets, Extensions and Templates)
MediumCVE-2025-59038: CWE-506: Embedded Malicious Code in prebid Prebid.js
HighCVE-2025-10197: SQL Injection in HJSoft HCM Human Resources Management System
MediumCVE-2025-10195: Improper Export of Android Application Components in Seismic App
MediumCVE-2025-21417: CWE-122: Heap-based Buffer Overflow in Microsoft Windows 10 Version 1809
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.