Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13254: SQL Injection in projectworlds Advanced Library Management System

0
Medium
VulnerabilityCVE-2025-13254cvecve-2025-13254
Published: Mon Nov 17 2025 (11/17/2025, 00:02:07 UTC)
Source: CVE Database V5
Vendor/Project: projectworlds
Product: Advanced Library Management System

Description

A vulnerability was identified in projectworlds Advanced Library Management System 1.0. This vulnerability affects unknown code of the file /add_member.php. Such manipulation of the argument roll_number leads to sql injection. The attack may be performed from remote. The exploit is publicly available and might be used.

AI-Powered Analysis

AILast updated: 11/24/2025, 04:49:50 UTC

Technical Analysis

CVE-2025-13254 is a SQL injection vulnerability identified in projectworlds Advanced Library Management System version 1.0, specifically in the /add_member.php script. The vulnerability arises due to insufficient sanitization of the roll_number parameter, which is used in SQL queries without proper validation or parameterization. This allows an attacker to craft malicious input that alters the intended SQL query logic, potentially enabling unauthorized access to or manipulation of the backend database. The vulnerability is remotely exploitable without requiring user interaction or elevated privileges, making it accessible to a wide range of attackers. The CVSS 4.0 base score is 5.3, reflecting medium severity, with attack vector as network, low complexity, no privileges required, and no user interaction needed. The impact on confidentiality, integrity, and availability is low to limited, but exploitation could expose sensitive member data or corrupt records. Although no active exploits have been observed in the wild, a public exploit is available, increasing the likelihood of future attacks. The lack of patches or vendor advisories at this time necessitates proactive mitigation by users. This vulnerability is particularly critical for organizations relying on this software for managing library memberships and records, as it could lead to data breaches or operational disruptions.

Potential Impact

For European organizations, particularly educational institutions, libraries, and research centers using projectworlds Advanced Library Management System 1.0, this vulnerability poses a risk of unauthorized access to sensitive member data such as personal identification and borrowing records. Data confidentiality could be compromised, potentially violating GDPR and other data protection regulations. Integrity of the database could also be affected if attackers modify or delete records, disrupting library operations and trustworthiness of data. Although the availability impact is limited, successful exploitation could lead to denial of service if database corruption occurs. The presence of a public exploit increases the risk of targeted attacks, especially in countries with large academic and public library infrastructures. Organizations may face reputational damage, regulatory penalties, and operational challenges if the vulnerability is exploited.

Mitigation Recommendations

1. Immediately implement input validation and sanitization for the roll_number parameter in /add_member.php to reject malicious inputs. 2. Refactor the code to use parameterized queries or prepared statements to prevent SQL injection attacks. 3. Conduct a thorough code audit of all input handling in the application to identify and remediate similar injection flaws. 4. Restrict database user privileges to the minimum necessary to limit the impact of potential exploitation. 5. Monitor web application logs for suspicious activity targeting the /add_member.php endpoint or unusual SQL errors. 6. If possible, isolate the library management system behind a web application firewall (WAF) configured to detect and block SQL injection attempts. 7. Engage with the vendor or community to obtain patches or updates addressing this vulnerability. 8. Educate administrators and developers on secure coding practices to prevent future injection vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-16T10:40:24.630Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691a6fd3c118c0da2e30eb3d

Added to database: 11/17/2025, 12:44:03 AM

Last enriched: 11/24/2025, 4:49:50 AM

Last updated: 1/7/2026, 8:48:07 AM

Views: 69

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats