Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12255: SQL Injection in code-projects Online Event Judging System

0
Medium
VulnerabilityCVE-2025-12255cvecve-2025-12255
Published: Mon Oct 27 2025 (10/27/2025, 09:02:11 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Online Event Judging System

Description

A security flaw has been discovered in code-projects Online Event Judging System 1.0. This affects an unknown part of the file /add_contestant.php. Performing manipulation of the argument fullname results in sql injection. Remote exploitation of the attack is possible. The exploit has been released to the public and may be exploited.

AI-Powered Analysis

AILast updated: 10/27/2025, 09:27:59 UTC

Technical Analysis

CVE-2025-12255 is a SQL injection vulnerability identified in version 1.0 of the code-projects Online Event Judging System, specifically within the /add_contestant.php script. The vulnerability arises from insufficient sanitization or validation of the 'fullname' parameter, which is directly incorporated into SQL queries. An attacker can remotely exploit this flaw by crafting malicious input to manipulate the SQL query logic, potentially allowing unauthorized access to or modification of the underlying database. The vulnerability does not require authentication or user interaction, increasing its risk profile. The CVSS 4.0 base score is 5.3 (medium), reflecting the network attack vector, low attack complexity, no privileges required, and no user interaction needed, but limited impact on confidentiality, integrity, and availability. Although no active exploitation in the wild has been reported, a public exploit is available, which could facilitate attacks by less skilled adversaries. The lack of patch links suggests that a fix may not yet be released, emphasizing the need for immediate mitigation. Organizations using this software for event judging should be aware that exploitation could lead to data leakage, unauthorized data manipulation, or denial of service, impacting the reliability and trustworthiness of event results. The vulnerability highlights the importance of secure coding practices, particularly input validation and use of parameterized queries to prevent injection flaws.

Potential Impact

For European organizations using the code-projects Online Event Judging System 1.0, exploitation of CVE-2025-12255 could result in unauthorized access to sensitive contestant data or manipulation of event results, undermining the integrity of competitions or evaluations. Confidentiality breaches could expose personal information, leading to privacy violations under GDPR. Integrity compromises could affect the fairness and credibility of events, potentially causing reputational damage. Availability impacts, while less likely, could disrupt event operations if the database is corrupted or queries are manipulated to cause failures. The remote and unauthenticated nature of the exploit increases the risk of widespread attacks, especially in sectors relying on this software for official or high-profile events. Given the public availability of an exploit, attackers could target organizations to extract data or disrupt services. The medium severity suggests moderate but tangible risks, particularly for organizations with limited security monitoring or patch management capabilities. The impact is amplified in regulated environments or where event outcomes have legal or financial consequences.

Mitigation Recommendations

1. Immediately implement input validation and sanitization on the 'fullname' parameter and any other user-supplied inputs to ensure only expected characters and formats are accepted. 2. Refactor the code to use parameterized queries or prepared statements instead of directly embedding user input into SQL commands, eliminating injection vectors. 3. Monitor database logs and application logs for unusual query patterns or errors indicative of injection attempts. 4. Restrict database user permissions to the minimum necessary, limiting the potential damage from a successful injection. 5. If a vendor patch becomes available, prioritize its deployment across all affected systems. 6. Employ Web Application Firewalls (WAFs) with SQL injection detection rules to provide an additional layer of defense. 7. Conduct security code reviews and penetration testing focused on injection vulnerabilities before deploying updates or new versions. 8. Educate developers and administrators about secure coding practices and the risks of SQL injection. 9. Isolate the Online Event Judging System in a segmented network zone to reduce exposure. 10. Regularly back up databases and verify restoration procedures to mitigate potential data loss or corruption.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-26T05:33:43.746Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ff37aa8ee3628e2d77b5f8

Added to database: 10/27/2025, 9:13:14 AM

Last enriched: 10/27/2025, 9:27:59 AM

Last updated: 10/27/2025, 10:21:11 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats