Skip to main content

CVE-2025-11118: SQL Injection in CodeAstro Student Grading System

Medium
VulnerabilityCVE-2025-11118cvecve-2025-11118
Published: Sun Sep 28 2025 (09/28/2025, 20:02:06 UTC)
Source: CVE Database V5
Vendor/Project: CodeAstro
Product: Student Grading System

Description

A vulnerability was identified in CodeAstro Student Grading System 1.0. This issue affects some unknown processing of the file /adminLogin.php. Such manipulation of the argument staffId leads to sql injection. The attack may be performed from remote. The exploit is publicly available and might be used.

AI-Powered Analysis

AILast updated: 09/28/2025, 20:12:14 UTC

Technical Analysis

CVE-2025-11118 is a SQL Injection vulnerability identified in version 1.0 of the CodeAstro Student Grading System, specifically affecting the /adminLogin.php file. The vulnerability arises from improper sanitization or validation of the 'staffId' parameter, which is processed in a way that allows an attacker to inject malicious SQL code. This injection can be performed remotely without any authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/AT:N/PR:N/UI:N). The vulnerability impacts the confidentiality, integrity, and availability of the backend database, as attackers can potentially extract sensitive data, modify records, or disrupt the system's normal operation. The CVSS score of 6.9 (medium severity) reflects the ease of exploitation combined with limited impact scope, as the vulnerability affects a specific version (1.0) of the product. Although no known exploits are currently reported in the wild, the public availability of exploit code increases the risk of exploitation. The vulnerability does not require privileges or user interaction, making it accessible to remote attackers. The lack of patch links suggests that a fix may not yet be available, emphasizing the need for immediate mitigation efforts.

Potential Impact

For European organizations, particularly educational institutions or entities using the CodeAstro Student Grading System, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to sensitive student and staff data, including grades and personal information, violating data protection regulations such as GDPR. Data integrity could be compromised, resulting in altered or falsified academic records, which can have legal and reputational consequences. Availability impacts could disrupt grading operations, affecting academic workflows and deadlines. Given the remote and unauthenticated nature of the attack, threat actors could exploit this vulnerability at scale, potentially targeting multiple institutions. The exposure of sensitive educational data could also lead to secondary attacks such as phishing or identity theft. Furthermore, the reputational damage and regulatory penalties associated with data breaches in the education sector could be substantial.

Mitigation Recommendations

Organizations should immediately audit their use of the CodeAstro Student Grading System version 1.0 and identify any instances of the vulnerable software. Since no official patch is currently available, temporary mitigations include implementing web application firewalls (WAFs) with rules specifically designed to detect and block SQL injection attempts targeting the 'staffId' parameter in /adminLogin.php. Input validation and parameterized queries should be enforced at the application level if source code access is possible. Network segmentation can limit exposure of the grading system to trusted internal networks only. Monitoring and logging of database queries and web server access should be enhanced to detect suspicious activity. Organizations should also prepare for rapid patch deployment once an official fix is released by the vendor. Additionally, conducting regular security assessments and penetration testing focused on injection vulnerabilities can help identify and remediate similar issues proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-27T17:41:26.605Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68d99688b966a587752dbb44

Added to database: 9/28/2025, 8:11:52 PM

Last enriched: 9/28/2025, 8:12:14 PM

Last updated: 9/28/2025, 8:12:26 PM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats