Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11105: SQL Injection in code-projects Simple Scheduling System

0
Medium
VulnerabilityCVE-2025-11105cvecve-2025-11105
Published: Sun Sep 28 2025 (09/28/2025, 13:02:06 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Simple Scheduling System

Description

A flaw has been found in code-projects Simple Scheduling System 1.0. This affects an unknown part of the file /schedulingsystem/addsubject.php. This manipulation of the argument subcode causes sql injection. Remote exploitation of the attack is possible. The exploit has been published and may be used.

AI-Powered Analysis

AILast updated: 10/06/2025, 00:39:07 UTC

Technical Analysis

CVE-2025-11105 identifies a SQL injection vulnerability in the Simple Scheduling System version 1.0 developed by code-projects. The flaw exists in the /schedulingsystem/addsubject.php script, where the 'subcode' parameter is improperly sanitized, allowing attackers to inject arbitrary SQL queries. This vulnerability can be exploited remotely without requiring authentication or user interaction, making it accessible to a wide range of attackers. The injection can lead to unauthorized reading, modification, or deletion of database records, potentially compromising sensitive scheduling data. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and partial impacts on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although no active exploits have been observed in the wild, the public availability of exploit code increases the likelihood of exploitation attempts. The vulnerability affects only version 1.0 of the product, and no official patches have been linked yet. The lack of secure coding practices, such as parameterized queries or input validation, is the root cause. Organizations relying on this scheduling system should assess their exposure and implement mitigations promptly.

Potential Impact

For European organizations, exploitation of this SQL injection vulnerability could lead to unauthorized access to sensitive scheduling data, including potentially personal or operational information. This could result in data breaches violating GDPR and other privacy regulations, leading to legal and financial repercussions. Integrity of scheduling data could be compromised, causing operational disruptions, mismanagement of resources, or denial of service if critical scheduling functions are affected. The remote and unauthenticated nature of the exploit increases the risk of widespread attacks, especially in sectors relying heavily on scheduling systems such as education, healthcare, and public administration. The medium severity suggests moderate but tangible risk, particularly for organizations that have not implemented compensating controls or are slow to patch. The absence of known active exploits currently provides a window for proactive defense, but the published exploit code means attackers could rapidly weaponize this vulnerability.

Mitigation Recommendations

1. Immediate code review and remediation: Implement parameterized queries or prepared statements in the /schedulingsystem/addsubject.php file to prevent SQL injection. 2. Input validation: Enforce strict validation and sanitization of all user-supplied inputs, especially the 'subcode' parameter, to reject malicious payloads. 3. Network segmentation and access controls: Restrict access to the scheduling system to trusted internal networks or VPNs to reduce exposure. 4. Web application firewall (WAF): Deploy or update WAF rules to detect and block SQL injection attempts targeting this endpoint. 5. Monitoring and logging: Enable detailed logging of database queries and web requests to detect anomalous activity indicative of exploitation attempts. 6. Patch management: Monitor vendor announcements for official patches or updates and apply them promptly once available. 7. Incident response readiness: Prepare to respond to potential breaches by having data backups, forensic capabilities, and communication plans in place. 8. User awareness: Inform relevant IT and security teams about the vulnerability and ensure they understand the risk and mitigation steps.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-27T17:21:12.485Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68d9349fb9360513218c4c14

Added to database: 9/28/2025, 1:14:07 PM

Last enriched: 10/6/2025, 12:39:07 AM

Last updated: 11/11/2025, 7:01:06 PM

Views: 65

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats