Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13395: SQL Injection in codehub666 94list

0
Medium
VulnerabilityCVE-2025-13395cvecve-2025-13395
Published: Wed Nov 19 2025 (11/19/2025, 11:02:05 UTC)
Source: CVE Database V5
Vendor/Project: codehub666
Product: 94list

Description

A security flaw has been discovered in codehub666 94list up to 5831c8240e99a72b7d3508c79ef46ae4b96befe8. The impacted element is the function Login of the file /function.php. The manipulation results in sql injection. The attack can be launched remotely. The exploit has been released to the public and may be exploited. This product does not use versioning. This is why information about affected and unaffected releases are unavailable.

AI-Powered Analysis

AILast updated: 11/26/2025, 12:00:28 UTC

Technical Analysis

The vulnerability identified as CVE-2025-13395 affects the 94list product developed by codehub666. It resides in the Login function within the /function.php file, where improper input sanitization allows an attacker to inject malicious SQL code. This SQL injection flaw can be exploited remotely without authentication or user interaction, enabling attackers to manipulate backend database queries. Potential consequences include unauthorized data access, data modification, or disruption of service. The product does not use versioning, making it difficult for users to determine if their installation is vulnerable. The vulnerability has been publicly disclosed with exploit code available, increasing the risk of exploitation. The CVSS 4.0 score of 6.9 reflects a medium severity, considering the network attack vector, lack of required privileges, and partial impact on confidentiality, integrity, and availability. No official patches or updates have been released yet, and no known widespread exploitation has been reported. The vulnerability's presence in a login function is particularly critical as it may allow attackers to bypass authentication or extract sensitive user credentials. Given the public availability of exploit code, timely mitigation is essential to prevent compromise.

Potential Impact

For European organizations, exploitation of this SQL injection vulnerability could lead to unauthorized access to sensitive data, including user credentials and internal records, potentially resulting in data breaches and regulatory non-compliance under GDPR. Integrity of data could be compromised by unauthorized modifications, impacting business operations and trustworthiness of information. Availability may also be affected if attackers disrupt database operations or cause denial of service. Organizations relying on 94list for critical functions or customer-facing services are at heightened risk. The public release of exploit code increases the likelihood of opportunistic attacks, especially against unpatched or poorly monitored systems. The lack of versioning complicates vulnerability management and incident response, potentially delaying detection and remediation. European entities in sectors such as finance, healthcare, and government, where data confidentiality and integrity are paramount, could face significant operational and reputational damage.

Mitigation Recommendations

Given the absence of official patches, organizations should immediately conduct a thorough code audit of the Login function in /function.php to identify and remediate the SQL injection flaw by implementing proper input validation and parameterized queries or prepared statements. Deploy Web Application Firewalls (WAFs) configured to detect and block SQL injection attempts targeting the vulnerable endpoint. Implement strict access controls and monitor logs for unusual login attempts or database errors indicative of exploitation attempts. Where possible, isolate the affected application environment and restrict database permissions to minimize potential damage. Educate development teams on secure coding practices to prevent similar vulnerabilities. Establish an incident response plan specific to SQL injection attacks and prepare for rapid containment and recovery. Regularly back up databases and verify backup integrity to enable restoration in case of data corruption or loss. Engage with the vendor or community for updates or patches and track vulnerability disclosures related to 94list.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-19T06:53:21.869Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691da73c258ca46eb47e777a

Added to database: 11/19/2025, 11:17:16 AM

Last enriched: 11/26/2025, 12:00:28 PM

Last updated: 1/8/2026, 8:50:16 AM

Views: 57

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats