Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13256: SQL Injection in projectworlds Advanced Library Management System

0
Medium
VulnerabilityCVE-2025-13256cvecve-2025-13256
Published: Mon Nov 17 2025 (11/17/2025, 01:02:06 UTC)
Source: CVE Database V5
Vendor/Project: projectworlds
Product: Advanced Library Management System

Description

A weakness has been identified in projectworlds Advanced Library Management System 1.0. Impacted is an unknown function of the file /borrow.php. Executing a manipulation of the argument roll_number can lead to sql injection. It is possible to launch the attack remotely. The exploit has been made available to the public and could be used for attacks.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 22:24:09 UTC

Technical Analysis

CVE-2025-13256 identifies a SQL injection vulnerability in projectworlds Advanced Library Management System version 1.0. The vulnerability exists in the /borrow.php script, where the roll_number parameter is not properly sanitized before being used in SQL queries. This allows an attacker to inject malicious SQL code remotely, without requiring authentication or user interaction, potentially leading to unauthorized data retrieval, modification, or deletion within the library management database. The vulnerability has a CVSS 4.0 base score of 5.3, indicating a medium severity level. The attack vector is network-based (AV:N), with low attack complexity (AC:L), and no privileges or user interaction required (PR:L, UI:N). The impact on confidentiality, integrity, and availability is low to limited but still significant for sensitive library data. Although no known exploits in the wild have been reported, the public availability of exploit code increases the risk of exploitation. The vulnerability affects only version 1.0 of the product, and no official patches have been linked yet. The weakness stems from improper input validation and lack of parameterized queries or prepared statements in the affected function. Organizations using this software should urgently review and remediate the vulnerable code to prevent potential data breaches or service disruptions.

Potential Impact

The primary impact of CVE-2025-13256 is unauthorized access to or manipulation of the library management system's database. Attackers exploiting this vulnerability could extract sensitive user information such as borrower identities, borrowing history, or potentially modify records to disrupt library operations. This could lead to privacy violations, data integrity issues, and operational downtime. For organizations relying on this system, especially educational institutions or public libraries, the breach could damage trust and result in compliance violations if personal data is exposed. The remote and unauthenticated nature of the exploit increases the risk of widespread attacks, particularly if exploit code is integrated into automated scanning or attack tools. However, the limited scope of impact on confidentiality, integrity, and availability, as reflected in the medium CVSS score, suggests the damage is significant but not catastrophic. Still, the potential for data leakage and service disruption warrants prompt attention.

Mitigation Recommendations

To mitigate CVE-2025-13256, organizations should immediately implement strict input validation on the roll_number parameter in /borrow.php, ensuring only expected formats (e.g., numeric or specific alphanumeric patterns) are accepted. The most effective fix is to refactor the affected code to use parameterized queries or prepared statements, which prevent SQL injection by separating code from data. If source code modification is not immediately feasible, deploying a web application firewall (WAF) with rules to detect and block SQL injection attempts targeting the roll_number parameter can reduce risk. Additionally, monitoring logs for suspicious query patterns or repeated failed attempts can provide early warning of exploitation attempts. Organizations should also track vendor communications for official patches or updates and apply them promptly once available. Regular security assessments and code reviews of custom or third-party software should be conducted to identify similar injection flaws proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-16T10:40:33.902Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691a76b5c118c0da2e3dce34

Added to database: 11/17/2025, 1:13:25 AM

Last enriched: 2/24/2026, 10:24:09 PM

Last updated: 3/21/2026, 4:39:45 PM

Views: 95

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses