Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11358: SQL Injection in code-projects Simple Banking System

0
Medium
VulnerabilityCVE-2025-11358cvecve-2025-11358
Published: Tue Oct 07 2025 (10/07/2025, 08:02:06 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Simple Banking System

Description

A weakness has been identified in code-projects Simple Banking System 1.0. Impacted is an unknown function of the file /removeuser.php. Executing manipulation of the argument ID can lead to sql injection. The attack may be launched remotely. The exploit has been made available to the public and could be exploited.

AI-Powered Analysis

AILast updated: 10/07/2025, 08:22:43 UTC

Technical Analysis

CVE-2025-11358 identifies a SQL injection vulnerability in the Simple Banking System 1.0 developed by code-projects, specifically in the /removeuser.php script. The vulnerability stems from insufficient input validation or sanitization of the 'ID' parameter, which is used in SQL queries to remove users. An attacker can remotely manipulate this parameter to inject arbitrary SQL commands, potentially bypassing authentication or authorization controls, and executing unauthorized database operations. The vulnerability does not require user interaction or elevated privileges, increasing its risk profile. The CVSS 4.0 base score is 5.3 (medium), reflecting network attack vector, low complexity, no privileges required, and no user interaction. The impact on confidentiality, integrity, and availability is limited but present, as attackers can potentially access or modify user data or disrupt user removal functionality. Although no active exploitation has been reported, the public availability of exploit code increases the likelihood of attacks. The lack of official patches or mitigations from the vendor necessitates immediate defensive measures by users of this software. This vulnerability is critical for banking systems where data integrity and confidentiality are paramount, and unauthorized user removal or data manipulation could have severe consequences.

Potential Impact

For European organizations, especially those in the financial sector using the Simple Banking System 1.0, this vulnerability poses a risk of unauthorized access to sensitive customer data and potential manipulation or deletion of user records. Such breaches could lead to financial fraud, regulatory non-compliance (e.g., GDPR violations), reputational damage, and operational disruptions. The ability to remotely exploit the vulnerability without authentication increases the attack surface, potentially allowing attackers to compromise multiple systems if the software is widely deployed. Even though the CVSS score is medium, the critical nature of banking data elevates the practical impact. Organizations may face legal and financial penalties if customer data confidentiality or integrity is compromised. Additionally, attackers could leverage this vulnerability as a foothold for further network penetration or lateral movement within an organization's infrastructure.

Mitigation Recommendations

1. Immediately implement input validation and sanitization on the 'ID' parameter in /removeuser.php to prevent SQL injection. 2. Refactor the code to use parameterized queries or prepared statements instead of dynamic SQL concatenation. 3. Restrict access to the /removeuser.php endpoint using network segmentation, firewalls, or application-level access controls to limit exposure. 4. Monitor logs for unusual or suspicious requests targeting the 'ID' parameter or the /removeuser.php script. 5. If possible, upgrade to a patched version of the software once available or apply vendor-provided patches. 6. Conduct a thorough security audit of the entire application to identify and remediate other potential injection points. 7. Educate developers on secure coding practices to prevent similar vulnerabilities in future releases. 8. Employ Web Application Firewalls (WAFs) with SQL injection detection rules as an interim protective measure. 9. Regularly back up databases and ensure recovery procedures are tested to mitigate data loss in case of exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-06T06:41:29.871Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68e4cb233f98f1161b9a3b3b

Added to database: 10/7/2025, 8:11:15 AM

Last enriched: 10/7/2025, 8:22:43 AM

Last updated: 10/7/2025, 1:15:58 PM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats