Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13395: SQL Injection in codehub666 94list

0
Medium
VulnerabilityCVE-2025-13395cvecve-2025-13395
Published: Wed Nov 19 2025 (11/19/2025, 11:02:05 UTC)
Source: CVE Database V5
Vendor/Project: codehub666
Product: 94list

Description

A security flaw has been discovered in codehub666 94list up to 5831c8240e99a72b7d3508c79ef46ae4b96befe8. The impacted element is the function Login of the file /function.php. The manipulation results in sql injection. The attack can be launched remotely. The exploit has been released to the public and may be exploited. This product does not use versioning. This is why information about affected and unaffected releases are unavailable.

AI-Powered Analysis

AILast updated: 11/19/2025, 11:23:55 UTC

Technical Analysis

CVE-2025-13395 identifies a SQL injection vulnerability in the 94list product developed by codehub666, specifically within the Login function located in the /function.php file. The vulnerability arises from improper sanitization of user-supplied input, allowing an attacker to craft malicious SQL statements that the backend database executes. This flaw can be exploited remotely without requiring authentication or user interaction, making it highly accessible to attackers. The injection can lead to unauthorized data disclosure, modification, or deletion, and potentially full compromise of the database server. The product does not implement versioning, which complicates tracking and patching affected deployments. Although no confirmed active exploitation in the wild has been reported, a public exploit is available, increasing the likelihood of attacks. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges or user interaction required (PR:N/UI:N), and impacts on confidentiality, integrity, and availability at a low to medium level (VC:L/VI:L/VA:L). The absence of patches or official fixes necessitates immediate mitigation efforts by users. This vulnerability is critical for organizations relying on 94list for authentication or user management, as exploitation could lead to severe data breaches or service disruptions.

Potential Impact

For European organizations, exploitation of this SQL injection vulnerability could result in unauthorized access to sensitive user credentials and data, leading to data breaches and potential regulatory non-compliance under GDPR. Integrity of stored data could be compromised, allowing attackers to alter or delete critical information, impacting business operations and trust. Availability may also be affected if attackers execute destructive queries or cause database outages. Organizations in sectors such as finance, healthcare, and government, which often handle sensitive data, face heightened risks. The public availability of an exploit increases the threat landscape, potentially attracting opportunistic attackers and cybercriminal groups. Additionally, the lack of versioning in 94list complicates vulnerability management and patch deployment, increasing exposure time. European entities using 94list as part of their authentication infrastructure or web applications must consider the risk of lateral movement and further network compromise following initial exploitation.

Mitigation Recommendations

Given the absence of official patches or versioning, European organizations should immediately conduct a thorough code audit of the Login function in /function.php to identify and remediate unsafe SQL query constructions. Implement parameterized queries or prepared statements to prevent injection. Employ strict input validation and sanitization on all user inputs, especially those involved in authentication processes. Deploy Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection payloads targeting 94list endpoints. Monitor logs for unusual database query patterns or failed login attempts indicative of exploitation attempts. Consider isolating or segmenting systems running 94list to limit potential lateral movement. If feasible, replace or upgrade 94list with more secure alternatives that follow secure coding practices and maintain version control. Educate development and security teams about SQL injection risks and ensure secure coding standards are enforced in future development. Finally, maintain up-to-date backups to enable recovery in case of data compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-19T06:53:21.869Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691da73c258ca46eb47e777a

Added to database: 11/19/2025, 11:17:16 AM

Last enriched: 11/19/2025, 11:23:55 AM

Last updated: 11/19/2025, 1:29:27 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats