Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11551: SQL Injection in code-projects Student Result Manager

0
Medium
VulnerabilityCVE-2025-11551cvecve-2025-11551
Published: Thu Oct 09 2025 (10/09/2025, 18:02:09 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Student Result Manager

Description

A vulnerability was determined in code-projects Student Result Manager 1.0. This affects an unknown function of the file src/students/Database.java. This manipulation of the argument roll/name/gpa causes sql injection. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized.

AI-Powered Analysis

AILast updated: 10/09/2025, 18:38:15 UTC

Technical Analysis

CVE-2025-11551 identifies a SQL injection vulnerability in the Student Result Manager version 1.0 developed by code-projects. The vulnerability resides in the source file src/students/Database.java, where input parameters such as roll, name, or gpa are improperly handled, allowing an attacker to inject malicious SQL code. This injection flaw enables remote attackers to manipulate backend database queries, potentially leading to unauthorized data access, data modification, or deletion. The vulnerability does not require user interaction or elevated privileges, making it easier to exploit remotely. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). The vulnerability has been publicly disclosed but no known exploits are currently active in the wild. The absence of patches or updates suggests that affected users must implement manual mitigations. The flaw likely stems from concatenating user inputs directly into SQL queries without proper sanitization or use of parameterized statements, a common cause of SQL injection. This vulnerability poses a significant risk to the confidentiality and integrity of student records managed by the application, potentially exposing sensitive personal and academic information to attackers.

Potential Impact

For European organizations, particularly educational institutions using the Student Result Manager software, this vulnerability could lead to unauthorized access to sensitive student data, including personal identifiers and academic records. Attackers exploiting this flaw could alter grades, delete records, or exfiltrate confidential information, undermining data integrity and privacy compliance obligations such as GDPR. The remote exploitability without user interaction increases the risk of automated attacks and widespread compromise. Although the product appears niche, any institution relying on it for student data management faces reputational damage, regulatory penalties, and operational disruption if exploited. The medium CVSS score reflects moderate impact, but the actual damage could escalate depending on the database contents and network segmentation. The lack of known exploits in the wild currently limits immediate risk, but public disclosure raises the likelihood of future attacks. Organizations must assess their exposure and prioritize remediation to prevent data breaches and maintain trust.

Mitigation Recommendations

1. Conduct an immediate code audit focusing on the src/students/Database.java file to identify and isolate vulnerable SQL query constructions. 2. Refactor all database access code to use parameterized queries or prepared statements to eliminate direct concatenation of user inputs. 3. Implement strict input validation and sanitization for all parameters, especially roll, name, and gpa fields, enforcing type, length, and format constraints. 4. Restrict database user permissions to the minimum necessary to limit the impact of potential exploitation. 5. Monitor application logs and database access patterns for unusual queries or anomalies indicative of SQL injection attempts. 6. If possible, deploy Web Application Firewalls (WAFs) with SQL injection detection rules tailored to the application’s query patterns. 7. Engage with the vendor or development community to obtain or develop official patches or updates addressing this vulnerability. 8. Educate developers and administrators on secure coding practices to prevent similar vulnerabilities in future releases. 9. Isolate or segment the application environment to limit lateral movement in case of compromise. 10. Prepare incident response plans specific to data breaches involving student data to ensure rapid containment and notification.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-09T11:16:07.221Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68e7fd81ba0e608b4fa9648d

Added to database: 10/9/2025, 6:22:57 PM

Last enriched: 10/9/2025, 6:38:15 PM

Last updated: 10/10/2025, 9:56:57 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats