Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13580: SQL Injection in code-projects Library System

0
Medium
VulnerabilityCVE-2025-13580cvecve-2025-13580
Published: Mon Nov 24 2025 (11/24/2025, 03:02:08 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Library System

Description

A vulnerability was determined in code-projects Library System 1.0. Affected is an unknown function of the file /mail.php. This manipulation of the argument ID causes sql injection. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized.

AI-Powered Analysis

AILast updated: 12/01/2025, 04:26:12 UTC

Technical Analysis

CVE-2025-13580 identifies a SQL injection vulnerability in the code-projects Library System version 1.0, specifically within the /mail.php file. The vulnerability is triggered by manipulation of the 'ID' parameter, which is not properly sanitized before being used in SQL queries. This flaw allows remote attackers to inject malicious SQL code, potentially leading to unauthorized data access, data modification, or database compromise. The attack vector is network-based, requiring no user interaction or elevated privileges, which increases the attack surface. The vulnerability was publicly disclosed on November 24, 2025, and while no active exploits have been reported, the public availability of details raises the risk of exploitation. The CVSS 4.0 score of 5.3 indicates a medium severity, with low complexity of attack and no need for authentication, but limited impact on confidentiality, integrity, and availability due to partial mitigations or scope limitations. The lack of patches at the time of disclosure necessitates immediate defensive measures. The vulnerability affects only version 1.0 of the product, suggesting that upgrading or patching could resolve the issue once available. This vulnerability is typical of SQL injection flaws where input validation is insufficient, emphasizing the need for secure coding practices and input sanitization.

Potential Impact

For European organizations using the code-projects Library System 1.0, this vulnerability could lead to unauthorized access to sensitive library data, including user information, borrowing records, and internal communications. Attackers could manipulate or extract data, potentially violating data protection regulations such as GDPR. The integrity of the database could be compromised, leading to corrupted records or denial of service if the database is disrupted. Since the vulnerability is remotely exploitable without authentication, attackers could target multiple organizations en masse. This poses a risk especially to educational institutions, public libraries, and government agencies relying on this system. The exposure could result in reputational damage, regulatory fines, and operational disruptions. The medium severity suggests that while the impact is significant, it may not lead to full system compromise without additional vulnerabilities. However, combined with other weaknesses, it could be part of a larger attack chain. The lack of known exploits currently reduces immediate risk but does not eliminate the threat, especially as exploit code may emerge following public disclosure.

Mitigation Recommendations

Organizations should immediately audit their use of the code-projects Library System to determine if version 1.0 is deployed. If so, they should prioritize upgrading to a patched version once available or apply any vendor-provided mitigations. In the interim, implement strict input validation and sanitization on all parameters, especially the 'ID' parameter in /mail.php, to prevent SQL injection. Employ parameterized queries or prepared statements in the codebase to eliminate direct concatenation of user input into SQL commands. Deploy Web Application Firewalls (WAFs) configured to detect and block SQL injection patterns targeting the affected endpoint. Conduct regular security assessments and code reviews focusing on injection flaws. Monitor logs for suspicious activity related to the /mail.php endpoint and unusual database queries. Restrict database permissions to the minimum necessary to limit the impact of potential exploitation. Educate developers and administrators on secure coding practices to prevent similar vulnerabilities. Finally, maintain an incident response plan to quickly address any exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-23T09:43:19.494Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6923cf69a532ea377e8d8efd

Added to database: 11/24/2025, 3:22:17 AM

Last enriched: 12/1/2025, 4:26:12 AM

Last updated: 1/8/2026, 10:30:36 PM

Views: 58

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats