Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12254: SQL Injection in code-projects Online Event Judging System

0
Medium
VulnerabilityCVE-2025-12254cvecve-2025-12254
Published: Mon Oct 27 2025 (10/27/2025, 09:02:08 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Online Event Judging System

Description

A vulnerability was identified in code-projects Online Event Judging System 1.0. Affected by this issue is some unknown functionality of the file /add_judge.php. Such manipulation of the argument fullname leads to sql injection. The attack may be launched remotely. The exploit is publicly available and might be used.

AI-Powered Analysis

AILast updated: 10/27/2025, 09:28:14 UTC

Technical Analysis

CVE-2025-12254 identifies a SQL injection vulnerability in the Online Event Judging System version 1.0 developed by code-projects. The vulnerability resides in the /add_judge.php endpoint, specifically in the handling of the 'fullname' parameter. Due to insufficient input validation and sanitization, an attacker can inject malicious SQL statements remotely without requiring authentication or user interaction. This injection could allow unauthorized access to the backend database, potentially exposing sensitive data, modifying judge records, or disrupting the availability of the judging system. The vulnerability is classified with a CVSS 4.0 score of 5.3 (medium severity), reflecting its network attack vector, low complexity, no privileges required, and no user interaction needed. The impact on confidentiality, integrity, and availability is limited but present, as the vulnerability allows partial compromise of the database. Although no active exploits have been reported in the wild, a public exploit exists, increasing the risk of exploitation. The lack of official patches or updates necessitates immediate mitigation efforts by affected organizations. The Online Event Judging System is typically used in event management contexts, making the integrity and availability of judging data critical for fair competition outcomes.

Potential Impact

For European organizations, exploitation of this SQL injection vulnerability could lead to unauthorized disclosure of sensitive information stored in the judging system's database, such as personal data of judges or participants. Integrity of judging data could be compromised, potentially altering event results and damaging organizational reputation. Availability impacts could disrupt event operations, causing delays or cancellations. Organizations involved in large-scale or high-profile events are particularly at risk, as manipulation of judging outcomes could have legal and financial consequences. Additionally, the presence of a public exploit increases the likelihood of opportunistic attacks, especially against organizations that have not implemented adequate input validation or database security measures. The medium severity rating suggests that while the threat is not critical, it is significant enough to warrant prompt attention to avoid escalation or chaining with other vulnerabilities.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately implement strict input validation and sanitization on the 'fullname' parameter in /add_judge.php, preferably using parameterized queries or prepared statements to prevent SQL injection. If source code access is available, refactor the affected code to use secure database access libraries that enforce query parameterization. In the absence of official patches, consider deploying web application firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting this endpoint. Conduct thorough security testing, including automated and manual penetration testing, to identify and remediate similar injection points. Additionally, restrict database user privileges to the minimum necessary to limit the impact of any successful injection. Monitor logs for suspicious activity related to the /add_judge.php endpoint and the 'fullname' parameter. Finally, plan for an update or patch from the vendor and maintain an incident response plan to quickly address any exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-26T05:33:41.054Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ff37aa8ee3628e2d77b5ee

Added to database: 10/27/2025, 9:13:14 AM

Last enriched: 10/27/2025, 9:28:14 AM

Last updated: 10/27/2025, 10:18:16 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats