Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13396: SQL Injection in code-projects Courier Management System

0
Medium
VulnerabilityCVE-2025-13396cvecve-2025-13396
Published: Wed Nov 19 2025 (11/19/2025, 15:32:05 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Courier Management System

Description

A weakness has been identified in code-projects Courier Management System 1.0. This affects an unknown function of the file /add-office.php. This manipulation of the argument OfficeName causes sql injection. The attack may be initiated remotely. The exploit has been made available to the public and could be exploited.

AI-Powered Analysis

AILast updated: 11/26/2025, 16:03:07 UTC

Technical Analysis

CVE-2025-13396 identifies an SQL injection vulnerability in the code-projects Courier Management System version 1.0. The flaw exists in the /add-office.php script, where the OfficeName parameter is improperly sanitized, allowing an attacker to inject malicious SQL code. This injection can be performed remotely without authentication or user interaction, making it accessible to a wide range of attackers. The vulnerability can lead to unauthorized access to the backend database, enabling attackers to read, modify, or delete sensitive courier management data. The CVSS 4.0 base score of 5.3 reflects a medium severity, considering the attack vector is network-based with low complexity and no privileges or user interaction required. However, the impact on confidentiality, integrity, and availability is limited to low, indicating partial compromise rather than full system takeover. No official patches have been linked yet, but the presence of public exploit code increases the risk of exploitation. The vulnerability is significant for organizations relying on this system for managing courier offices, as it could expose operational data and customer information to attackers.

Potential Impact

For European organizations, this vulnerability poses risks to the confidentiality and integrity of courier management data, including office locations, operational details, and potentially customer information. Exploitation could disrupt courier operations by altering or deleting critical data, leading to service delays or failures. Data breaches resulting from SQL injection could also lead to regulatory non-compliance under GDPR, resulting in financial penalties and reputational damage. Organizations in logistics, delivery services, and supply chain management that use the affected Courier Management System version 1.0 are particularly vulnerable. The medium severity rating suggests that while the threat is serious, it may not lead to full system compromise but could still cause significant operational and data security issues. The availability of public exploit code increases the likelihood of opportunistic attacks, especially from automated scanning tools targeting known vulnerabilities.

Mitigation Recommendations

Organizations should immediately audit their use of the code-projects Courier Management System and confirm if version 1.0 is in use. If so, they should implement strict input validation and sanitization on the OfficeName parameter to prevent SQL injection. Employing parameterized queries or prepared statements in the /add-office.php script is critical to eliminate injection vectors. Monitoring and logging database queries for anomalous activity can help detect exploitation attempts early. If vendor patches or updates become available, they should be applied promptly. Network-level protections such as web application firewalls (WAFs) can be configured to block malicious SQL payloads targeting this endpoint. Additionally, restricting access to the management interface to trusted IPs or VPNs can reduce exposure. Regular security assessments and penetration testing should be conducted to ensure no other injection points exist. Finally, organizations should review their incident response plans to handle potential data breaches stemming from this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-19T08:33:40.499Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691de57d964c14ffeea48e34

Added to database: 11/19/2025, 3:42:53 PM

Last enriched: 11/26/2025, 4:03:07 PM

Last updated: 1/7/2026, 6:07:59 AM

Views: 53

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats