Skip to main content

CVE-2025-11116: SQL Injection in code-projects Simple Scheduling System

Medium
VulnerabilityCVE-2025-11116cvecve-2025-11116
Published: Sun Sep 28 2025 (09/28/2025, 19:02:05 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Simple Scheduling System

Description

A vulnerability was found in code-projects Simple Scheduling System 1.0. This affects an unknown part of the file /add.home.php. The manipulation of the argument faculty results in sql injection. The attack can be executed remotely. The exploit has been made public and could be used. Other parameters might be affected as well.

AI-Powered Analysis

AILast updated: 09/28/2025, 19:06:42 UTC

Technical Analysis

CVE-2025-11116 is a SQL Injection vulnerability identified in version 1.0 of the code-projects Simple Scheduling System, specifically affecting the /add.home.php file. The vulnerability arises from improper sanitization or validation of the 'faculty' parameter, which allows an attacker to inject malicious SQL code remotely without requiring authentication or user interaction. This flaw can lead to unauthorized access to the backend database, potentially exposing sensitive scheduling data or enabling further compromise of the system. The vulnerability has a CVSS 4.0 base score of 6.9, indicating a medium severity level. The attack vector is network-based with low attack complexity and no privileges or user interaction needed. The impact on confidentiality, integrity, and availability is limited but present, as the vulnerability allows partial compromise of data and system state. Although no public exploits are currently known in the wild, the exploit code has been made public, increasing the risk of exploitation. Other parameters in the same or related scripts might also be vulnerable, suggesting a broader input validation issue within the application. The lack of available patches or vendor advisories at this time means affected users must rely on mitigation strategies until an official fix is released.

Potential Impact

For European organizations using the Simple Scheduling System 1.0, this vulnerability poses a risk of unauthorized data disclosure and potential manipulation of scheduling information. This could disrupt organizational operations, especially in sectors relying heavily on scheduling such as education, healthcare, and public administration. Confidential information about faculty or personnel could be exposed, leading to privacy violations under GDPR. Additionally, attackers could leverage this vulnerability as a foothold to escalate privileges or move laterally within the network. The medium severity rating reflects a moderate but tangible risk, particularly for organizations that have not implemented compensating controls or network segmentation. The remote and unauthenticated nature of the exploit increases the threat surface, especially if the scheduling system is exposed to the internet or accessible from less secure network segments.

Mitigation Recommendations

Organizations should immediately audit their deployment of the Simple Scheduling System to identify if version 1.0 is in use. Until a patch is available, it is critical to implement web application firewall (WAF) rules specifically targeting SQL injection patterns on the 'faculty' parameter and related inputs. Input validation and sanitization should be enforced at the application level, ideally by applying parameterized queries or prepared statements if source code access is possible. Network segmentation should be used to restrict access to the scheduling system only to trusted internal users and systems. Regular monitoring of logs for suspicious SQL query patterns or anomalous access attempts is recommended. If feasible, temporarily disabling or restricting the vulnerable functionality (/add.home.php) can reduce exposure. Organizations should also prepare to apply vendor patches promptly once released and consider conducting a security review of other parameters and modules within the application to identify additional injection points.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-27T17:37:37.693Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68d987277554179dcb262790

Added to database: 9/28/2025, 7:06:15 PM

Last enriched: 9/28/2025, 7:06:42 PM

Last updated: 9/28/2025, 7:42:47 PM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats