Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12262: SQL Injection in code-projects Online Event Judging System

0
Medium
VulnerabilityCVE-2025-12262cvecve-2025-12262
Published: Mon Oct 27 2025 (10/27/2025, 10:32:05 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Online Event Judging System

Description

A vulnerability was determined in code-projects Online Event Judging System 1.0. This impacts an unknown function of the file /edit_criteria.php. Executing manipulation of the argument crit_id can lead to sql injection. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized.

AI-Powered Analysis

AILast updated: 11/03/2025, 11:26:02 UTC

Technical Analysis

CVE-2025-12262 is a SQL injection vulnerability identified in the code-projects Online Event Judging System version 1.0. The vulnerability exists in the /edit_criteria.php file, where the crit_id parameter is improperly sanitized, allowing attackers to inject malicious SQL code. This injection flaw can be exploited remotely without requiring authentication or user interaction, making it accessible to unauthenticated attackers over the network. The vulnerability impacts the confidentiality, integrity, and availability of the underlying database, although the CVSS 4.0 vector indicates low impact on each (VC:L, VI:L, VA:L). The CVSS score of 5.3 classifies it as medium severity. The flaw could allow attackers to extract sensitive data, modify event judging criteria, or disrupt the system's normal operation. No known exploits are currently active in the wild, but public disclosure increases the risk of exploitation attempts. The lack of available patches means organizations must rely on mitigating controls such as input validation or web application firewalls until an official fix is released. The vulnerability affects only version 1.0 of the product, so upgrading to a patched version when available is critical.

Potential Impact

For European organizations, the impact of this vulnerability could be significant if they rely on the code-projects Online Event Judging System for managing events, competitions, or evaluations. Exploitation could lead to unauthorized access to sensitive judging criteria or participant data, potentially compromising confidentiality. Integrity could be affected by unauthorized modification of judging parameters, which may undermine the fairness and trustworthiness of events. Availability impacts, while rated low, could still disrupt event operations if attackers manipulate the database or cause errors. Organizations in sectors such as education, professional associations, or event management that use this software may face reputational damage and operational disruptions. Given the remote exploitability without authentication, attackers could target these systems from anywhere, increasing the threat landscape. The medium severity rating suggests moderate urgency but should not be ignored, especially in environments where data integrity and confidentiality are critical.

Mitigation Recommendations

To mitigate this vulnerability, organizations should first check for any official patches or updates from the vendor and apply them promptly once available. In the absence of patches, implement strict input validation on the crit_id parameter to ensure only expected numeric or predefined values are accepted. Employ parameterized queries or prepared statements in the application code to prevent SQL injection. Deploy web application firewalls (WAFs) with rules designed to detect and block SQL injection attempts targeting the /edit_criteria.php endpoint. Conduct thorough code reviews and security testing of the application to identify and remediate similar injection points. Limit database user privileges to the minimum necessary to reduce the impact of a successful injection. Monitor logs for suspicious activity related to crit_id parameter manipulation. Finally, consider isolating the judging system network segment to reduce exposure to external threats.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-26T05:43:16.956Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ff4d0fbbaf5d265c8ed1b2

Added to database: 10/27/2025, 10:44:31 AM

Last enriched: 11/3/2025, 11:26:02 AM

Last updated: 12/10/2025, 2:45:32 PM

Views: 147

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats