Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11329: SQL Injection in code-projects Online Course Registration

0
Medium
VulnerabilityCVE-2025-11329cvecve-2025-11329
Published: Mon Oct 06 2025 (10/06/2025, 09:02:06 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Online Course Registration

Description

A flaw has been found in code-projects Online Course Registration 1.0. Impacted is an unknown function of the file /admin/manage-students.php. This manipulation of the argument ID causes sql injection. The attack can be initiated remotely. The exploit has been published and may be used.

AI-Powered Analysis

AILast updated: 10/06/2025, 09:33:28 UTC

Technical Analysis

CVE-2025-11329 identifies a SQL injection vulnerability in code-projects Online Course Registration version 1.0, specifically within an unknown function in the /admin/manage-students.php file. The vulnerability arises from improper sanitization or validation of the 'ID' parameter, which is susceptible to malicious SQL payloads. An attacker can remotely exploit this flaw without requiring authentication or user interaction, allowing them to manipulate backend SQL queries. This can lead to unauthorized data disclosure, modification, or deletion within the database, impacting confidentiality, integrity, and availability. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and partial impacts on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although no active exploitation in the wild is reported, a public exploit exists, increasing the risk of exploitation by opportunistic attackers. The vulnerability affects only version 1.0 of the product, and no official patch or remediation link has been provided yet. The affected software is likely used by educational institutions or training providers to manage course registrations and student records, making the data sensitive and critical. The vulnerability's presence in an administrative script suggests that access to the admin interface may be required, but the CVSS vector indicates no privileges are needed, implying the interface might be exposed or poorly protected. This elevates the risk of exploitation and potential data breaches.

Potential Impact

For European organizations, especially educational institutions and training providers using code-projects Online Course Registration 1.0, this vulnerability poses a significant risk of unauthorized access to sensitive student data, including personal information and enrollment records. Exploitation could lead to data breaches, loss of data integrity, and potential disruption of course management services. This may result in regulatory non-compliance, particularly under GDPR, leading to legal and financial consequences. The ability to remotely exploit the vulnerability without authentication increases the attack surface, potentially allowing attackers to escalate their access or pivot to other internal systems. Additionally, compromised systems could be used to launch further attacks or distribute malware. The medium severity rating suggests moderate impact, but the ease of exploitation and exposure of administrative functionality could amplify the consequences. Organizations may face reputational damage and operational disruptions if the vulnerability is exploited.

Mitigation Recommendations

European organizations should immediately assess whether they use code-projects Online Course Registration version 1.0 and restrict access to the /admin/manage-students.php interface, ideally limiting it to trusted internal networks or VPNs. Implement strict input validation and sanitization on all parameters, especially the 'ID' parameter, to prevent SQL injection. Transition to parameterized queries or prepared statements in the application code to eliminate injection vectors. Monitor web server and application logs for suspicious activity targeting the vulnerable endpoint. If possible, deploy web application firewalls (WAFs) with rules to detect and block SQL injection attempts targeting this specific parameter and URL path. Engage with the vendor or community for patches or updates and apply them promptly once available. Conduct security audits and penetration tests focusing on injection vulnerabilities in the application. Educate administrators about the risks of exposing administrative interfaces publicly and enforce strong authentication and access controls. Finally, maintain regular backups of critical data to enable recovery in case of data corruption or loss.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-05T14:26:08.684Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68e38a0e9a8b61c808612f6c

Added to database: 10/6/2025, 9:21:18 AM

Last enriched: 10/6/2025, 9:33:28 AM

Last updated: 10/7/2025, 1:50:29 PM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats