CVE-2025-13303: SQL Injection in code-projects Courier Management System
A vulnerability was determined in code-projects Courier Management System 1.0. Affected by this issue is some unknown functionality of the file /search-edit.php. This manipulation of the argument Consignment causes sql injection. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized.
AI Analysis
Technical Summary
CVE-2025-13303 is a SQL Injection vulnerability identified in version 1.0 of the code-projects Courier Management System, specifically in the /search-edit.php script. The vulnerability arises from improper sanitization of the 'Consignment' parameter, which is used in SQL queries without adequate validation or parameterization. This flaw allows an attacker to inject malicious SQL code remotely, manipulating the database queries executed by the application. The attack vector is network accessible (AV:N), requires low attack complexity (AC:L), and does not require user interaction (UI:N). However, it requires low privileges (PR:L), meaning the attacker must have some level of authenticated access, though this is minimal. The impact on confidentiality, integrity, and availability is limited but present (VC:L, VI:L, VA:L), indicating partial compromise potential. The vulnerability has been publicly disclosed but no active exploits have been reported yet. The absence of patches or updates at the time of disclosure means organizations must implement interim mitigations. The vulnerability affects only version 1.0 of the Courier Management System, which is used for managing courier and shipment operations. Exploitation could lead to unauthorized data access, modification, or denial of service within the affected system. The CVSS 4.0 base score is 5.3, categorizing it as medium severity. The vulnerability does not involve scope change or security requirements changes, and no known mitigations or patches have been officially released at the time of publication.
Potential Impact
For European organizations using the affected Courier Management System version 1.0, this vulnerability could result in unauthorized access to shipment and consignment data, potentially exposing sensitive customer and logistics information. The partial compromise of data integrity could lead to manipulation of shipment records, causing operational disruptions and financial losses. Availability impacts, while limited, could affect the continuity of courier services, damaging customer trust and business reputation. Given the critical role of logistics in European supply chains, exploitation could have cascading effects on delivery timelines and regulatory compliance, especially concerning data protection laws like GDPR. Organizations in sectors such as e-commerce, manufacturing, and retail that rely heavily on courier management systems are particularly at risk. The requirement for low privileges means insider threats or compromised accounts could be leveraged to exploit this vulnerability, increasing the attack surface. Although no active exploits are reported, the public disclosure raises the likelihood of future attacks, necessitating proactive defense measures.
Mitigation Recommendations
Organizations should immediately audit their use of the code-projects Courier Management System version 1.0 and identify any instances of the /search-edit.php functionality. Implement strict input validation and sanitization on the 'Consignment' parameter to prevent injection of malicious SQL code. Where possible, refactor the application code to use parameterized queries or prepared statements to eliminate SQL injection risks. Monitor database logs and application behavior for unusual queries or access patterns related to consignment data. Restrict access to the affected functionality to trusted users and enforce the principle of least privilege to minimize potential exploitation. If an updated version or patch becomes available from the vendor, prioritize its deployment. Additionally, consider deploying web application firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the vulnerable parameter. Conduct security awareness training for staff to recognize potential exploitation signs and maintain regular backups of critical data to enable recovery in case of compromise.
Affected Countries
Germany, France, Netherlands, United Kingdom, Italy, Spain
CVE-2025-13303: SQL Injection in code-projects Courier Management System
Description
A vulnerability was determined in code-projects Courier Management System 1.0. Affected by this issue is some unknown functionality of the file /search-edit.php. This manipulation of the argument Consignment causes sql injection. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized.
AI-Powered Analysis
Technical Analysis
CVE-2025-13303 is a SQL Injection vulnerability identified in version 1.0 of the code-projects Courier Management System, specifically in the /search-edit.php script. The vulnerability arises from improper sanitization of the 'Consignment' parameter, which is used in SQL queries without adequate validation or parameterization. This flaw allows an attacker to inject malicious SQL code remotely, manipulating the database queries executed by the application. The attack vector is network accessible (AV:N), requires low attack complexity (AC:L), and does not require user interaction (UI:N). However, it requires low privileges (PR:L), meaning the attacker must have some level of authenticated access, though this is minimal. The impact on confidentiality, integrity, and availability is limited but present (VC:L, VI:L, VA:L), indicating partial compromise potential. The vulnerability has been publicly disclosed but no active exploits have been reported yet. The absence of patches or updates at the time of disclosure means organizations must implement interim mitigations. The vulnerability affects only version 1.0 of the Courier Management System, which is used for managing courier and shipment operations. Exploitation could lead to unauthorized data access, modification, or denial of service within the affected system. The CVSS 4.0 base score is 5.3, categorizing it as medium severity. The vulnerability does not involve scope change or security requirements changes, and no known mitigations or patches have been officially released at the time of publication.
Potential Impact
For European organizations using the affected Courier Management System version 1.0, this vulnerability could result in unauthorized access to shipment and consignment data, potentially exposing sensitive customer and logistics information. The partial compromise of data integrity could lead to manipulation of shipment records, causing operational disruptions and financial losses. Availability impacts, while limited, could affect the continuity of courier services, damaging customer trust and business reputation. Given the critical role of logistics in European supply chains, exploitation could have cascading effects on delivery timelines and regulatory compliance, especially concerning data protection laws like GDPR. Organizations in sectors such as e-commerce, manufacturing, and retail that rely heavily on courier management systems are particularly at risk. The requirement for low privileges means insider threats or compromised accounts could be leveraged to exploit this vulnerability, increasing the attack surface. Although no active exploits are reported, the public disclosure raises the likelihood of future attacks, necessitating proactive defense measures.
Mitigation Recommendations
Organizations should immediately audit their use of the code-projects Courier Management System version 1.0 and identify any instances of the /search-edit.php functionality. Implement strict input validation and sanitization on the 'Consignment' parameter to prevent injection of malicious SQL code. Where possible, refactor the application code to use parameterized queries or prepared statements to eliminate SQL injection risks. Monitor database logs and application behavior for unusual queries or access patterns related to consignment data. Restrict access to the affected functionality to trusted users and enforce the principle of least privilege to minimize potential exploitation. If an updated version or patch becomes available from the vendor, prioritize its deployment. Additionally, consider deploying web application firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the vulnerable parameter. Conduct security awareness training for staff to recognize potential exploitation signs and maintain regular backups of critical data to enable recovery in case of compromise.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-17T14:10:13.358Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 691ba1c4bb922d22627154ce
Added to database: 11/17/2025, 10:29:24 PM
Last enriched: 11/17/2025, 10:29:37 PM
Last updated: 11/18/2025, 7:20:06 AM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12524: CWE-639 Authorization Bypass Through User-Controlled Key in johnjamesjacoby Post Type Switcher
MediumCVE-2025-48593: Remote code execution in Google Android
UnknownCVE-2025-64734: CWE-772 Missing Release of Resource after Effective Lifetime in Gallagher T21 Reader
LowCVE-2025-52578: CWE-335 Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG) in Gallagher High Sec End of Line Module
MediumCVE-2025-52457: CWE-208 Observable Timing Discrepancy in Gallagher HBUS Devices
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.