CVE-2025-13240: SQL Injection in code-projects Student Information System
A vulnerability was detected in code-projects Student Information System 2.0. This affects an unknown part of the file /searchquery.php. Performing manipulation of the argument s results in sql injection. Remote exploitation of the attack is possible. The exploit is now public and may be used.
AI Analysis
Technical Summary
CVE-2025-13240 is a SQL Injection vulnerability identified in the code-projects Student Information System version 2.0. The flaw exists in the /searchquery.php file where the 's' parameter is improperly sanitized, allowing attackers to manipulate SQL queries executed by the application. This vulnerability is remotely exploitable without requiring authentication or user interaction, which significantly lowers the barrier for attackers. The CVSS 4.0 score is 6.9 (medium severity), reflecting the moderate impact on confidentiality, integrity, and availability. Exploiting this vulnerability could allow attackers to extract sensitive student information, modify or delete records, or disrupt system availability. Although no active exploitation has been reported, the public availability of exploit code increases the likelihood of attacks. The vulnerability affects educational institutions using this Student Information System, potentially exposing personal data and disrupting academic operations. The absence of patches or official fixes necessitates immediate mitigation through secure coding practices such as input validation and prepared statements. Monitoring database queries and network traffic for anomalies is also recommended to detect exploitation attempts early.
Potential Impact
For European organizations, particularly educational institutions, this vulnerability poses a significant risk to the confidentiality of student and staff personal data, potentially violating GDPR requirements. Integrity of academic records and administrative data could be compromised, leading to misinformation or fraudulent activities. Availability of the Student Information System may be disrupted, affecting critical academic and administrative processes. The exposure of sensitive data could result in reputational damage, legal penalties, and financial losses. Given the remote and unauthenticated nature of the exploit, attackers from anywhere could target vulnerable systems, increasing the threat landscape. The public availability of exploit code further elevates the risk of widespread attacks. Organizations relying on this software must consider the impact on compliance, operational continuity, and data protection obligations under European law.
Mitigation Recommendations
1. Immediately audit all instances of code-projects Student Information System version 2.0 to identify vulnerable deployments. 2. Implement input validation and sanitization for the 's' parameter in /searchquery.php, ensuring only expected input formats are accepted. 3. Refactor database queries to use parameterized statements or prepared queries to prevent SQL injection. 4. Deploy Web Application Firewalls (WAFs) with rules specifically targeting SQL injection patterns related to this vulnerability. 5. Monitor database logs and application logs for unusual query patterns or errors indicative of injection attempts. 6. Restrict database user permissions to the minimum necessary to limit the impact of a successful injection. 7. Educate development and IT teams about secure coding practices and the importance of patching known vulnerabilities. 8. Engage with the vendor or community to obtain or develop official patches or updates. 9. Conduct penetration testing focused on injection flaws to verify remediation effectiveness. 10. Prepare incident response plans to quickly address any exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands
CVE-2025-13240: SQL Injection in code-projects Student Information System
Description
A vulnerability was detected in code-projects Student Information System 2.0. This affects an unknown part of the file /searchquery.php. Performing manipulation of the argument s results in sql injection. Remote exploitation of the attack is possible. The exploit is now public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-13240 is a SQL Injection vulnerability identified in the code-projects Student Information System version 2.0. The flaw exists in the /searchquery.php file where the 's' parameter is improperly sanitized, allowing attackers to manipulate SQL queries executed by the application. This vulnerability is remotely exploitable without requiring authentication or user interaction, which significantly lowers the barrier for attackers. The CVSS 4.0 score is 6.9 (medium severity), reflecting the moderate impact on confidentiality, integrity, and availability. Exploiting this vulnerability could allow attackers to extract sensitive student information, modify or delete records, or disrupt system availability. Although no active exploitation has been reported, the public availability of exploit code increases the likelihood of attacks. The vulnerability affects educational institutions using this Student Information System, potentially exposing personal data and disrupting academic operations. The absence of patches or official fixes necessitates immediate mitigation through secure coding practices such as input validation and prepared statements. Monitoring database queries and network traffic for anomalies is also recommended to detect exploitation attempts early.
Potential Impact
For European organizations, particularly educational institutions, this vulnerability poses a significant risk to the confidentiality of student and staff personal data, potentially violating GDPR requirements. Integrity of academic records and administrative data could be compromised, leading to misinformation or fraudulent activities. Availability of the Student Information System may be disrupted, affecting critical academic and administrative processes. The exposure of sensitive data could result in reputational damage, legal penalties, and financial losses. Given the remote and unauthenticated nature of the exploit, attackers from anywhere could target vulnerable systems, increasing the threat landscape. The public availability of exploit code further elevates the risk of widespread attacks. Organizations relying on this software must consider the impact on compliance, operational continuity, and data protection obligations under European law.
Mitigation Recommendations
1. Immediately audit all instances of code-projects Student Information System version 2.0 to identify vulnerable deployments. 2. Implement input validation and sanitization for the 's' parameter in /searchquery.php, ensuring only expected input formats are accepted. 3. Refactor database queries to use parameterized statements or prepared queries to prevent SQL injection. 4. Deploy Web Application Firewalls (WAFs) with rules specifically targeting SQL injection patterns related to this vulnerability. 5. Monitor database logs and application logs for unusual query patterns or errors indicative of injection attempts. 6. Restrict database user permissions to the minimum necessary to limit the impact of a successful injection. 7. Educate development and IT teams about secure coding practices and the importance of patching known vulnerabilities. 8. Engage with the vendor or community to obtain or develop official patches or updates. 9. Conduct penetration testing focused on injection flaws to verify remediation effectiveness. 10. Prepare incident response plans to quickly address any exploitation attempts.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-15T06:57:07.015Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69197159f90981bc0fe630f8
Added to database: 11/16/2025, 6:38:17 AM
Last enriched: 1/7/2026, 7:40:39 PM
Last updated: 1/8/2026, 7:23:53 AM
Views: 63
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0700: SQL Injection in code-projects Intern Membership Management System
MediumCVE-2025-13679: CWE-862 Missing Authorization in themeum Tutor LMS – eLearning and online course solution
MediumCVE-2026-0699: SQL Injection in code-projects Intern Membership Management System
MediumCVE-2026-0698: SQL Injection in code-projects Intern Membership Management System
MediumCVE-2026-0697: SQL Injection in code-projects Intern Membership Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.