Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13579: SQL Injection in code-projects Library System

0
Medium
VulnerabilityCVE-2025-13579cvecve-2025-13579
Published: Mon Nov 24 2025 (11/24/2025, 02:32:06 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Library System

Description

A vulnerability was found in code-projects Library System 1.0. This impacts an unknown function of the file /return.php. The manipulation of the argument ID results in sql injection. The attack can be launched remotely. The exploit has been made public and could be used.

AI-Powered Analysis

AILast updated: 12/01/2025, 04:25:48 UTC

Technical Analysis

CVE-2025-13579 identifies a SQL injection vulnerability in the code-projects Library System version 1.0, located in the /return.php script. The vulnerability arises from improper sanitization of the 'ID' parameter, which is directly used in SQL queries. This allows an attacker to inject malicious SQL code remotely without requiring authentication or user interaction. Exploiting this flaw could enable attackers to read, modify, or delete database records, potentially exposing sensitive user or library data, corrupting records, or disrupting service availability. The vulnerability has a CVSS 4.0 base score of 5.3, reflecting medium severity due to low complexity of attack and no required privileges, but limited impact scope. Although no known exploits are currently active in the wild, the public availability of exploit code increases the risk of future attacks. The vulnerability does not require user interaction and affects confidentiality, integrity, and availability to a limited extent. The lack of vendor patches or official remediation guidance necessitates that organizations implement immediate mitigations such as input validation and query parameterization. This vulnerability is particularly relevant to organizations managing library systems with this software, as it could lead to unauthorized data access or service interruptions.

Potential Impact

For European organizations, the impact of this vulnerability includes potential unauthorized access to sensitive library user data, manipulation or deletion of library records, and disruption of library services. Confidentiality is at risk as attackers could extract personal or transactional data from the database. Integrity could be compromised by unauthorized modification of records, affecting the reliability of library operations. Availability may be impacted if attackers exploit the vulnerability to cause database errors or denial of service. Given the medium severity and the remote, unauthenticated nature of the attack, organizations running the affected version of the code-projects Library System face a tangible risk of data breaches and operational disruption. This could lead to reputational damage, regulatory penalties under GDPR if personal data is exposed, and increased costs for incident response and recovery. The risk is heightened in institutions with critical library infrastructure or large user bases, including universities, public libraries, and research centers across Europe.

Mitigation Recommendations

Organizations should immediately audit their use of the code-projects Library System version 1.0 and identify any instances of the vulnerable /return.php endpoint. Since no official patches are currently available, implement the following mitigations: 1) Apply strict input validation on the 'ID' parameter to allow only expected numeric or alphanumeric values. 2) Refactor database queries to use parameterized statements or prepared queries to prevent SQL injection. 3) Restrict database user permissions to the minimum necessary, avoiding elevated privileges that could exacerbate impact. 4) Monitor web server and database logs for suspicious query patterns or repeated access attempts to /return.php. 5) Employ web application firewalls (WAFs) with rules to detect and block SQL injection attempts targeting this endpoint. 6) Plan for an upgrade or patch from the vendor once available. 7) Conduct security awareness training for developers and administrators on secure coding practices. These targeted actions go beyond generic advice and address the specific vulnerability vector and environment.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-23T09:43:13.639Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6923cf69a532ea377e8d8ef6

Added to database: 11/24/2025, 3:22:17 AM

Last enriched: 12/1/2025, 4:25:48 AM

Last updated: 1/8/2026, 10:31:25 PM

Views: 56

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats