CVE-2025-13578: SQL Injection in code-projects Library System
A vulnerability has been found in code-projects Library System 1.0. This affects an unknown function of the file /index.php of the component Login. The manipulation of the argument Username leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-13578 identifies a SQL injection vulnerability in the code-projects Library System version 1.0, specifically within the Login component's /index.php file. The vulnerability arises from improper sanitization of the Username parameter, which can be manipulated remotely without requiring authentication or user interaction. This flaw enables attackers to inject malicious SQL code, potentially allowing unauthorized access to the backend database, data exfiltration, modification, or even deletion of records. The vulnerability has a CVSS 4.0 base score of 6.9, indicating a medium severity level. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact on confidentiality, integrity, and availability is low to medium (VC:L, VI:L, VA:L), suggesting that while the damage is not catastrophic, it can still compromise sensitive data or disrupt services. No patches have been officially released yet, and no known exploits are reported in the wild, but the public disclosure increases the risk of exploitation by threat actors. The vulnerability affects only version 1.0 of the product, which may limit the scope but still poses a significant risk to organizations using this outdated software. The lack of specific CWE identifiers suggests the need for further technical analysis to understand the exact injection point and context. Overall, this vulnerability represents a classic SQL injection risk that can be mitigated by proper input validation and secure coding practices.
Potential Impact
For European organizations, the impact of CVE-2025-13578 can be significant, especially for those relying on the code-projects Library System 1.0 in academic, public library, or research environments. Exploitation could lead to unauthorized access to sensitive patron data, including personal identification and borrowing records, potentially violating GDPR and other data protection regulations. Integrity of library databases could be compromised, affecting the accuracy of records and operational continuity. Availability may also be impacted if attackers execute destructive SQL commands, leading to service disruptions. The remote and unauthenticated nature of the exploit increases the risk of widespread attacks, particularly in institutions with internet-facing login portals. Given the public disclosure, attackers may develop automated tools to scan and exploit vulnerable systems, increasing the threat landscape. The medium severity rating suggests that while the vulnerability is not critical, it still requires prompt attention to avoid reputational damage, regulatory penalties, and operational impact.
Mitigation Recommendations
European organizations should immediately assess their exposure to the code-projects Library System version 1.0 and prioritize upgrading to a patched or newer version once available. In the absence of an official patch, organizations should implement input validation and sanitization on the Username parameter to prevent SQL injection. Employing parameterized queries or prepared statements in the login component's code is essential to eliminate injection vectors. Network-level mitigations such as web application firewalls (WAFs) can be configured to detect and block SQL injection attempts targeting the login endpoint. Monitoring and logging login requests for anomalous patterns can help identify exploitation attempts early. Restricting access to the login page through IP whitelisting or VPNs can reduce exposure. Additionally, organizations should conduct security audits and penetration testing focused on injection vulnerabilities. Educating developers and administrators about secure coding practices and timely patch management will help prevent similar issues in the future.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2025-13578: SQL Injection in code-projects Library System
Description
A vulnerability has been found in code-projects Library System 1.0. This affects an unknown function of the file /index.php of the component Login. The manipulation of the argument Username leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-13578 identifies a SQL injection vulnerability in the code-projects Library System version 1.0, specifically within the Login component's /index.php file. The vulnerability arises from improper sanitization of the Username parameter, which can be manipulated remotely without requiring authentication or user interaction. This flaw enables attackers to inject malicious SQL code, potentially allowing unauthorized access to the backend database, data exfiltration, modification, or even deletion of records. The vulnerability has a CVSS 4.0 base score of 6.9, indicating a medium severity level. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact on confidentiality, integrity, and availability is low to medium (VC:L, VI:L, VA:L), suggesting that while the damage is not catastrophic, it can still compromise sensitive data or disrupt services. No patches have been officially released yet, and no known exploits are reported in the wild, but the public disclosure increases the risk of exploitation by threat actors. The vulnerability affects only version 1.0 of the product, which may limit the scope but still poses a significant risk to organizations using this outdated software. The lack of specific CWE identifiers suggests the need for further technical analysis to understand the exact injection point and context. Overall, this vulnerability represents a classic SQL injection risk that can be mitigated by proper input validation and secure coding practices.
Potential Impact
For European organizations, the impact of CVE-2025-13578 can be significant, especially for those relying on the code-projects Library System 1.0 in academic, public library, or research environments. Exploitation could lead to unauthorized access to sensitive patron data, including personal identification and borrowing records, potentially violating GDPR and other data protection regulations. Integrity of library databases could be compromised, affecting the accuracy of records and operational continuity. Availability may also be impacted if attackers execute destructive SQL commands, leading to service disruptions. The remote and unauthenticated nature of the exploit increases the risk of widespread attacks, particularly in institutions with internet-facing login portals. Given the public disclosure, attackers may develop automated tools to scan and exploit vulnerable systems, increasing the threat landscape. The medium severity rating suggests that while the vulnerability is not critical, it still requires prompt attention to avoid reputational damage, regulatory penalties, and operational impact.
Mitigation Recommendations
European organizations should immediately assess their exposure to the code-projects Library System version 1.0 and prioritize upgrading to a patched or newer version once available. In the absence of an official patch, organizations should implement input validation and sanitization on the Username parameter to prevent SQL injection. Employing parameterized queries or prepared statements in the login component's code is essential to eliminate injection vectors. Network-level mitigations such as web application firewalls (WAFs) can be configured to detect and block SQL injection attempts targeting the login endpoint. Monitoring and logging login requests for anomalous patterns can help identify exploitation attempts early. Restricting access to the login page through IP whitelisting or VPNs can reduce exposure. Additionally, organizations should conduct security audits and penetration testing focused on injection vulnerabilities. Educating developers and administrators about secure coding practices and timely patch management will help prevent similar issues in the future.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-23T09:42:56.684Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6923c4dda532ea377e83711d
Added to database: 11/24/2025, 2:37:17 AM
Last enriched: 11/24/2025, 2:52:24 AM
Last updated: 11/24/2025, 12:52:26 PM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-41017: CWE-862 Missing Authorization in Davantis DFUSION
MediumCVE-2025-41016: CWE-862 Missing Authorization in Davantis DFUSION
HighCVE-2025-12741: CWE-20 Improper Input Validation in Google Cloud Looker
HighCVE-2025-12740: CWE-20 Improper Input Validation in Google Cloud Looker
HighSpanish Airline Iberia Notifies Customers of Data Breach
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.