Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13302: SQL Injection in code-projects Courier Management System

0
Medium
VulnerabilityCVE-2025-13302cvecve-2025-13302
Published: Mon Nov 17 2025 (11/17/2025, 21:32:05 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Courier Management System

Description

A vulnerability was identified in code-projects Courier Management System 1.0. This affects an unknown part of the file /add-new-officer.php. Such manipulation of the argument ManagerName leads to sql injection. The attack can be launched remotely. The exploit is publicly available and might be used.

AI-Powered Analysis

AILast updated: 11/17/2025, 22:00:17 UTC

Technical Analysis

CVE-2025-13302 identifies a SQL injection vulnerability in the Courier Management System version 1.0 developed by code-projects. The vulnerability exists in the /add-new-officer.php file, where the ManagerName parameter is improperly sanitized, allowing an attacker to inject malicious SQL code. This injection flaw can be exploited remotely without requiring user interaction or authentication, enabling attackers to manipulate backend SQL queries. The impact includes unauthorized data access, modification, or deletion, potentially leading to data breaches or disruption of courier management operations. The vulnerability has a CVSS 4.0 base score of 5.1, indicating medium severity, with low complexity of attack and no privileges or user interaction needed. Although no active exploitation has been reported, a public exploit is available, increasing the risk of future attacks. The vulnerability affects only version 1.0 of the product, and no official patches have been released yet. The lack of secure coding practices, such as parameterized queries or input validation, is the root cause. This vulnerability highlights the importance of secure development lifecycle practices in web applications managing critical logistics data.

Potential Impact

For European organizations, especially those in the logistics and courier sectors, this vulnerability poses a significant risk to the confidentiality, integrity, and availability of sensitive operational data. Exploitation could lead to unauthorized disclosure of customer information, manipulation of courier assignments, or disruption of delivery schedules, impacting business continuity and customer trust. Given the remote exploitability without authentication, attackers could leverage this flaw to gain deeper access into internal systems or pivot to other network segments. The medium severity suggests moderate but tangible risks, particularly for organizations relying on version 1.0 of this Courier Management System. Data protection regulations such as GDPR increase the stakes, as breaches involving personal data could result in regulatory penalties and reputational damage. The availability of a public exploit increases the urgency for European organizations to assess their exposure and implement mitigations promptly.

Mitigation Recommendations

Organizations should immediately conduct an audit to identify deployments of code-projects Courier Management System version 1.0. Since no official patch is currently available, developers or administrators must implement input validation and sanitize the ManagerName parameter rigorously. The most effective mitigation is to refactor the vulnerable code to use parameterized queries or prepared statements to prevent SQL injection. Web application firewalls (WAFs) can be configured to detect and block SQL injection attempts targeting the /add-new-officer.php endpoint as a temporary protective measure. Monitoring database logs for suspicious queries and unusual activity is recommended to detect potential exploitation attempts. Additionally, organizations should restrict database user privileges to the minimum necessary to limit the impact of any successful injection. Planning for an upgrade to a patched or newer version of the software once available is critical. Finally, staff training on secure coding and regular security assessments of web applications should be enforced to prevent similar vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-17T14:10:10.707Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691b98f601a6b16707f49d42

Added to database: 11/17/2025, 9:51:50 PM

Last enriched: 11/17/2025, 10:00:17 PM

Last updated: 11/22/2025, 11:37:40 AM

Views: 398

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats