Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12938: SQL Injection in projectworlds Online Admission System

0
Medium
VulnerabilityCVE-2025-12938cvecve-2025-12938
Published: Mon Nov 10 2025 (11/10/2025, 12:02:05 UTC)
Source: CVE Database V5
Vendor/Project: projectworlds
Product: Online Admission System

Description

CVE-2025-12938 is a medium-severity SQL injection vulnerability in projectworlds Online Admission System version 1. 0, specifically in the /process_login. php file via the keywords parameter. The flaw allows remote attackers to inject malicious SQL queries without authentication or user interaction. Exploitation can lead to partial compromise of confidentiality, integrity, and availability of the backend database. No patches are currently available, and while no known exploits are in the wild, a public exploit exists. European organizations using this admission system, especially educational institutions, are at risk of data breaches and service disruption. Mitigation requires immediate input validation, parameterized queries, and monitoring for suspicious activity. Countries with significant adoption of this software or large education sectors are most likely affected. The vulnerability’s CVSS score is 6.

AI-Powered Analysis

AILast updated: 11/17/2025, 12:45:38 UTC

Technical Analysis

CVE-2025-12938 is a SQL injection vulnerability identified in projectworlds Online Admission System version 1.0. The vulnerability resides in an unspecified functionality within the /process_login.php file, where the 'keywords' parameter is improperly sanitized, allowing an attacker to inject arbitrary SQL commands. This injection flaw can be exploited remotely without requiring authentication or user interaction, making it accessible to unauthenticated attackers over the network. The vulnerability can lead to unauthorized access, modification, or deletion of data stored in the backend database, potentially compromising confidentiality, integrity, and availability. The CVSS v4.0 score of 6.9 (medium severity) reflects that the attack vector is network-based with low attack complexity and no privileges or user interaction needed, but the impact on confidentiality, integrity, and availability is limited rather than complete. No official patches or fixes have been published yet, and although no known exploits are currently observed in the wild, a public exploit is available, increasing the risk of exploitation. The vulnerability affects only version 1.0 of the product, which is typically used by educational institutions for managing online admissions. The lack of input validation and use of unsafe SQL query construction are the root causes. Remediation involves implementing parameterized queries or prepared statements, input validation, and possibly web application firewall (WAF) rules to detect and block injection attempts.

Potential Impact

For European organizations, particularly educational institutions and universities using projectworlds Online Admission System 1.0, this vulnerability poses a significant risk of data breaches involving sensitive student and applicant information. Exploitation could lead to unauthorized disclosure of personal data, modification or deletion of admission records, and disruption of admission services, impacting operational continuity and compliance with data protection regulations such as GDPR. The ability to exploit remotely without authentication increases the attack surface, potentially allowing attackers to compromise multiple institutions if the software is widely deployed. The medium severity rating indicates that while the impact is serious, it may not result in full system compromise or widespread service outages. However, the exposure of sensitive educational data and potential reputational damage can be substantial. Additionally, attackers could leverage the vulnerability as a foothold for further network intrusion or lateral movement within affected organizations.

Mitigation Recommendations

Organizations should immediately audit their use of projectworlds Online Admission System version 1.0 and isolate affected instances from public networks where possible. Implement strict input validation on all user-supplied data, especially the 'keywords' parameter in /process_login.php, to prevent injection of malicious SQL code. Refactor the application code to use parameterized queries or prepared statements instead of dynamic SQL query construction. Deploy web application firewalls (WAFs) with rules specifically designed to detect and block SQL injection attempts targeting this vulnerability. Monitor logs and network traffic for unusual database queries or access patterns indicative of exploitation attempts. If feasible, restrict database user permissions to the minimum necessary to limit the impact of a successful injection. Engage with the vendor or community to obtain patches or updates and apply them promptly once available. Conduct regular security assessments and penetration testing focused on injection vulnerabilities. Educate development and IT teams about secure coding practices to prevent similar issues in future software versions.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-10T06:51:16.330Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6911dc1bc3394bcf0da063c6

Added to database: 11/10/2025, 12:35:39 PM

Last enriched: 11/17/2025, 12:45:38 PM

Last updated: 12/26/2025, 12:14:36 AM

Views: 62

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats