CVE-2025-13395: SQL Injection in codehub666 94list
A security flaw has been discovered in codehub666 94list up to 5831c8240e99a72b7d3508c79ef46ae4b96befe8. The impacted element is the function Login of the file /function.php. The manipulation results in sql injection. The attack can be launched remotely. The exploit has been released to the public and may be exploited. This product does not use versioning. This is why information about affected and unaffected releases are unavailable.
AI Analysis
Technical Summary
CVE-2025-13395 identifies a SQL injection vulnerability in the 94list product developed by codehub666, specifically within the Login function located in the /function.php file. The vulnerability arises from improper sanitization of user-supplied input, allowing an attacker to craft malicious SQL statements that the backend database executes. This flaw can be exploited remotely without requiring authentication or user interaction, making it highly accessible to attackers. The injection can lead to unauthorized data disclosure, modification, or deletion, and potentially full compromise of the database server. The product does not implement versioning, which complicates tracking and patching affected deployments. Although no confirmed active exploitation in the wild has been reported, a public exploit is available, increasing the likelihood of attacks. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges or user interaction required (PR:N/UI:N), and impacts on confidentiality, integrity, and availability at a low to medium level (VC:L/VI:L/VA:L). The absence of patches or official fixes necessitates immediate mitigation efforts by users. This vulnerability is critical for organizations relying on 94list for authentication or user management, as exploitation could lead to severe data breaches or service disruptions.
Potential Impact
For European organizations, exploitation of this SQL injection vulnerability could result in unauthorized access to sensitive user credentials and data, leading to data breaches and potential regulatory non-compliance under GDPR. Integrity of stored data could be compromised, allowing attackers to alter or delete critical information, impacting business operations and trust. Availability may also be affected if attackers execute destructive queries or cause database outages. Organizations in sectors such as finance, healthcare, and government, which often handle sensitive data, face heightened risks. The public availability of an exploit increases the threat landscape, potentially attracting opportunistic attackers and cybercriminal groups. Additionally, the lack of versioning in 94list complicates vulnerability management and patch deployment, increasing exposure time. European entities using 94list as part of their authentication infrastructure or web applications must consider the risk of lateral movement and further network compromise following initial exploitation.
Mitigation Recommendations
Given the absence of official patches or versioning, European organizations should immediately conduct a thorough code audit of the Login function in /function.php to identify and remediate unsafe SQL query constructions. Implement parameterized queries or prepared statements to prevent injection. Employ strict input validation and sanitization on all user inputs, especially those involved in authentication processes. Deploy Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection payloads targeting 94list endpoints. Monitor logs for unusual database query patterns or failed login attempts indicative of exploitation attempts. Consider isolating or segmenting systems running 94list to limit potential lateral movement. If feasible, replace or upgrade 94list with more secure alternatives that follow secure coding practices and maintain version control. Educate development and security teams about SQL injection risks and ensure secure coding standards are enforced in future development. Finally, maintain up-to-date backups to enable recovery in case of data compromise.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
CVE-2025-13395: SQL Injection in codehub666 94list
Description
A security flaw has been discovered in codehub666 94list up to 5831c8240e99a72b7d3508c79ef46ae4b96befe8. The impacted element is the function Login of the file /function.php. The manipulation results in sql injection. The attack can be launched remotely. The exploit has been released to the public and may be exploited. This product does not use versioning. This is why information about affected and unaffected releases are unavailable.
AI-Powered Analysis
Technical Analysis
CVE-2025-13395 identifies a SQL injection vulnerability in the 94list product developed by codehub666, specifically within the Login function located in the /function.php file. The vulnerability arises from improper sanitization of user-supplied input, allowing an attacker to craft malicious SQL statements that the backend database executes. This flaw can be exploited remotely without requiring authentication or user interaction, making it highly accessible to attackers. The injection can lead to unauthorized data disclosure, modification, or deletion, and potentially full compromise of the database server. The product does not implement versioning, which complicates tracking and patching affected deployments. Although no confirmed active exploitation in the wild has been reported, a public exploit is available, increasing the likelihood of attacks. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges or user interaction required (PR:N/UI:N), and impacts on confidentiality, integrity, and availability at a low to medium level (VC:L/VI:L/VA:L). The absence of patches or official fixes necessitates immediate mitigation efforts by users. This vulnerability is critical for organizations relying on 94list for authentication or user management, as exploitation could lead to severe data breaches or service disruptions.
Potential Impact
For European organizations, exploitation of this SQL injection vulnerability could result in unauthorized access to sensitive user credentials and data, leading to data breaches and potential regulatory non-compliance under GDPR. Integrity of stored data could be compromised, allowing attackers to alter or delete critical information, impacting business operations and trust. Availability may also be affected if attackers execute destructive queries or cause database outages. Organizations in sectors such as finance, healthcare, and government, which often handle sensitive data, face heightened risks. The public availability of an exploit increases the threat landscape, potentially attracting opportunistic attackers and cybercriminal groups. Additionally, the lack of versioning in 94list complicates vulnerability management and patch deployment, increasing exposure time. European entities using 94list as part of their authentication infrastructure or web applications must consider the risk of lateral movement and further network compromise following initial exploitation.
Mitigation Recommendations
Given the absence of official patches or versioning, European organizations should immediately conduct a thorough code audit of the Login function in /function.php to identify and remediate unsafe SQL query constructions. Implement parameterized queries or prepared statements to prevent injection. Employ strict input validation and sanitization on all user inputs, especially those involved in authentication processes. Deploy Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection payloads targeting 94list endpoints. Monitor logs for unusual database query patterns or failed login attempts indicative of exploitation attempts. Consider isolating or segmenting systems running 94list to limit potential lateral movement. If feasible, replace or upgrade 94list with more secure alternatives that follow secure coding practices and maintain version control. Educate development and security teams about SQL injection risks and ensure secure coding standards are enforced in future development. Finally, maintain up-to-date backups to enable recovery in case of data compromise.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-19T06:53:21.869Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 691da73c258ca46eb47e777a
Added to database: 11/19/2025, 11:17:16 AM
Last enriched: 11/19/2025, 11:23:55 AM
Last updated: 11/19/2025, 1:29:27 PM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Hacking Black Friday: using LLMs to save on the “sale of the year” | Kaspersky official blog
MediumCVE-2025-12592: CWE-1392 CWE-1392: Use of Default Credentials in Vivotek Affected device model numbers are FD7131-VVTK,FD7131-VVTK,FD7131-VVTK,FD7141-VVTK,IP7131-VVTK,IP7133-VVTK,IP7133-VVTK,IP7133-VVTK,IP7134-VVTK,IP7135-VVTK,IP7135-VVTK,IP7135-VVTK,IP7135-VVTK,IP7137-VVTK,IP7137-VVTK,IP7137-VVTK,IP7137-VVTK,IP7137-VVTK,IP7137-VVTK,IP7138-VVTK,IP7142-VVTK,IP7142-VVTK,IP7151-VVTK,IP7152-VVTK,IP7153-VVTK,IP7153-VVTK,IP7154-VVTK,IP7330-VVTK,IP7330-VVTK,IP7330-VVTK,IP8131-VVTK,IP8131-VVTK,IP8131-VVTK,IP8131W-VVTK,PT7135-VVTK,PT7137-TCON,PT7137-VVTK,PT7137-VVTK,PT7137-VVTK,PT7137-VVTK,PZ7131-VVTK,PZ7131-VVTK,PZ71X1-VVTK,PZ71X1-VVTK,PZ71X2-VVTK,SD73X3-VVTK,SD73X3-VVTK,SD73X3-VVTK,TC5330-VVTK,TC5332-TCVV,TC5333-TCVV,TC5633-TCVV,TC5633-VVTK,VS7100-VVTK,VS7100-VVTK,VS7100-VVTK
CriticalCline Bot AI Agent for Coding Vulnerable to Data Theft and Code Execution
MediumCVE-2025-10437: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Eksagate Electronic Engineering and Computer Industry Trade Inc. Webpack Management System
CriticalLargest Azure DDoS Attack Powered by Aisuru Botnet
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.