CVE-2025-13302: SQL Injection in code-projects Courier Management System
A vulnerability was identified in code-projects Courier Management System 1.0. This affects an unknown part of the file /add-new-officer.php. Such manipulation of the argument ManagerName leads to sql injection. The attack can be launched remotely. The exploit is publicly available and might be used.
AI Analysis
Technical Summary
CVE-2025-13302 identifies a SQL injection vulnerability in the Courier Management System version 1.0 developed by code-projects. The vulnerability exists in the /add-new-officer.php file, where the ManagerName parameter is improperly sanitized, allowing an attacker to inject malicious SQL code. This injection flaw can be exploited remotely without requiring user interaction or authentication, enabling attackers to manipulate backend SQL queries. The impact includes unauthorized data access, modification, or deletion, potentially leading to data breaches or disruption of courier management operations. The vulnerability has a CVSS 4.0 base score of 5.1, indicating medium severity, with low complexity of attack and no privileges or user interaction needed. Although no active exploitation has been reported, a public exploit is available, increasing the risk of future attacks. The vulnerability affects only version 1.0 of the product, and no official patches have been released yet. The lack of secure coding practices, such as parameterized queries or input validation, is the root cause. This vulnerability highlights the importance of secure development lifecycle practices in web applications managing critical logistics data.
Potential Impact
For European organizations, especially those in the logistics and courier sectors, this vulnerability poses a significant risk to the confidentiality, integrity, and availability of sensitive operational data. Exploitation could lead to unauthorized disclosure of customer information, manipulation of courier assignments, or disruption of delivery schedules, impacting business continuity and customer trust. Given the remote exploitability without authentication, attackers could leverage this flaw to gain deeper access into internal systems or pivot to other network segments. The medium severity suggests moderate but tangible risks, particularly for organizations relying on version 1.0 of this Courier Management System. Data protection regulations such as GDPR increase the stakes, as breaches involving personal data could result in regulatory penalties and reputational damage. The availability of a public exploit increases the urgency for European organizations to assess their exposure and implement mitigations promptly.
Mitigation Recommendations
Organizations should immediately conduct an audit to identify deployments of code-projects Courier Management System version 1.0. Since no official patch is currently available, developers or administrators must implement input validation and sanitize the ManagerName parameter rigorously. The most effective mitigation is to refactor the vulnerable code to use parameterized queries or prepared statements to prevent SQL injection. Web application firewalls (WAFs) can be configured to detect and block SQL injection attempts targeting the /add-new-officer.php endpoint as a temporary protective measure. Monitoring database logs for suspicious queries and unusual activity is recommended to detect potential exploitation attempts. Additionally, organizations should restrict database user privileges to the minimum necessary to limit the impact of any successful injection. Planning for an upgrade to a patched or newer version of the software once available is critical. Finally, staff training on secure coding and regular security assessments of web applications should be enforced to prevent similar vulnerabilities.
Affected Countries
Germany, France, Netherlands, United Kingdom, Italy, Spain
CVE-2025-13302: SQL Injection in code-projects Courier Management System
Description
A vulnerability was identified in code-projects Courier Management System 1.0. This affects an unknown part of the file /add-new-officer.php. Such manipulation of the argument ManagerName leads to sql injection. The attack can be launched remotely. The exploit is publicly available and might be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-13302 identifies a SQL injection vulnerability in the Courier Management System version 1.0 developed by code-projects. The vulnerability exists in the /add-new-officer.php file, where the ManagerName parameter is improperly sanitized, allowing an attacker to inject malicious SQL code. This injection flaw can be exploited remotely without requiring user interaction or authentication, enabling attackers to manipulate backend SQL queries. The impact includes unauthorized data access, modification, or deletion, potentially leading to data breaches or disruption of courier management operations. The vulnerability has a CVSS 4.0 base score of 5.1, indicating medium severity, with low complexity of attack and no privileges or user interaction needed. Although no active exploitation has been reported, a public exploit is available, increasing the risk of future attacks. The vulnerability affects only version 1.0 of the product, and no official patches have been released yet. The lack of secure coding practices, such as parameterized queries or input validation, is the root cause. This vulnerability highlights the importance of secure development lifecycle practices in web applications managing critical logistics data.
Potential Impact
For European organizations, especially those in the logistics and courier sectors, this vulnerability poses a significant risk to the confidentiality, integrity, and availability of sensitive operational data. Exploitation could lead to unauthorized disclosure of customer information, manipulation of courier assignments, or disruption of delivery schedules, impacting business continuity and customer trust. Given the remote exploitability without authentication, attackers could leverage this flaw to gain deeper access into internal systems or pivot to other network segments. The medium severity suggests moderate but tangible risks, particularly for organizations relying on version 1.0 of this Courier Management System. Data protection regulations such as GDPR increase the stakes, as breaches involving personal data could result in regulatory penalties and reputational damage. The availability of a public exploit increases the urgency for European organizations to assess their exposure and implement mitigations promptly.
Mitigation Recommendations
Organizations should immediately conduct an audit to identify deployments of code-projects Courier Management System version 1.0. Since no official patch is currently available, developers or administrators must implement input validation and sanitize the ManagerName parameter rigorously. The most effective mitigation is to refactor the vulnerable code to use parameterized queries or prepared statements to prevent SQL injection. Web application firewalls (WAFs) can be configured to detect and block SQL injection attempts targeting the /add-new-officer.php endpoint as a temporary protective measure. Monitoring database logs for suspicious queries and unusual activity is recommended to detect potential exploitation attempts. Additionally, organizations should restrict database user privileges to the minimum necessary to limit the impact of any successful injection. Planning for an upgrade to a patched or newer version of the software once available is critical. Finally, staff training on secure coding and regular security assessments of web applications should be enforced to prevent similar vulnerabilities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-17T14:10:10.707Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 691b98f601a6b16707f49d42
Added to database: 11/17/2025, 9:51:50 PM
Last enriched: 11/17/2025, 10:00:17 PM
Last updated: 11/22/2025, 11:37:40 AM
Views: 398
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13526: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in walterpinem OneClick Chat to Order
HighCVE-2025-13318: CWE-862 Missing Authorization in codepeople Booking Calendar Contact Form
MediumCVE-2025-13136: CWE-862 Missing Authorization in westerndeal GSheetConnector For Ninja Forms
MediumCVE-2025-13384: CWE-862 Missing Authorization in codepeople CP Contact Form with PayPal
HighCVE-2025-13317: CWE-862 Missing Authorization in codepeople Appointment Booking Calendar
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.