CVE-2025-13580: SQL Injection in code-projects Library System
A vulnerability was determined in code-projects Library System 1.0. Affected is an unknown function of the file /mail.php. This manipulation of the argument ID causes sql injection. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized.
AI Analysis
Technical Summary
CVE-2025-13580 identifies a SQL injection vulnerability in the code-projects Library System version 1.0, specifically within the /mail.php file. The vulnerability is triggered by manipulation of the 'ID' parameter, which is not properly sanitized before being used in SQL queries. This flaw allows remote attackers to inject malicious SQL code, potentially leading to unauthorized data access, data modification, or database compromise. The attack vector is network-based, requiring no user interaction or elevated privileges, which increases the attack surface. The vulnerability was publicly disclosed on November 24, 2025, and while no active exploits have been reported, the public availability of details raises the risk of exploitation. The CVSS 4.0 score of 5.3 indicates a medium severity, with low complexity of attack and no need for authentication, but limited impact on confidentiality, integrity, and availability due to partial mitigations or scope limitations. The lack of patches at the time of disclosure necessitates immediate defensive measures. The vulnerability affects only version 1.0 of the product, suggesting that upgrading or patching could resolve the issue once available. This vulnerability is typical of SQL injection flaws where input validation is insufficient, emphasizing the need for secure coding practices and input sanitization.
Potential Impact
For European organizations using the code-projects Library System 1.0, this vulnerability could lead to unauthorized access to sensitive library data, including user information, borrowing records, and internal communications. Attackers could manipulate or extract data, potentially violating data protection regulations such as GDPR. The integrity of the database could be compromised, leading to corrupted records or denial of service if the database is disrupted. Since the vulnerability is remotely exploitable without authentication, attackers could target multiple organizations en masse. This poses a risk especially to educational institutions, public libraries, and government agencies relying on this system. The exposure could result in reputational damage, regulatory fines, and operational disruptions. The medium severity suggests that while the impact is significant, it may not lead to full system compromise without additional vulnerabilities. However, combined with other weaknesses, it could be part of a larger attack chain. The lack of known exploits currently reduces immediate risk but does not eliminate the threat, especially as exploit code may emerge following public disclosure.
Mitigation Recommendations
Organizations should immediately audit their use of the code-projects Library System to determine if version 1.0 is deployed. If so, they should prioritize upgrading to a patched version once available or apply any vendor-provided mitigations. In the interim, implement strict input validation and sanitization on all parameters, especially the 'ID' parameter in /mail.php, to prevent SQL injection. Employ parameterized queries or prepared statements in the codebase to eliminate direct concatenation of user input into SQL commands. Deploy Web Application Firewalls (WAFs) configured to detect and block SQL injection patterns targeting the affected endpoint. Conduct regular security assessments and code reviews focusing on injection flaws. Monitor logs for suspicious activity related to the /mail.php endpoint and unusual database queries. Restrict database permissions to the minimum necessary to limit the impact of potential exploitation. Educate developers and administrators on secure coding practices to prevent similar vulnerabilities. Finally, maintain an incident response plan to quickly address any exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-13580: SQL Injection in code-projects Library System
Description
A vulnerability was determined in code-projects Library System 1.0. Affected is an unknown function of the file /mail.php. This manipulation of the argument ID causes sql injection. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized.
AI-Powered Analysis
Technical Analysis
CVE-2025-13580 identifies a SQL injection vulnerability in the code-projects Library System version 1.0, specifically within the /mail.php file. The vulnerability is triggered by manipulation of the 'ID' parameter, which is not properly sanitized before being used in SQL queries. This flaw allows remote attackers to inject malicious SQL code, potentially leading to unauthorized data access, data modification, or database compromise. The attack vector is network-based, requiring no user interaction or elevated privileges, which increases the attack surface. The vulnerability was publicly disclosed on November 24, 2025, and while no active exploits have been reported, the public availability of details raises the risk of exploitation. The CVSS 4.0 score of 5.3 indicates a medium severity, with low complexity of attack and no need for authentication, but limited impact on confidentiality, integrity, and availability due to partial mitigations or scope limitations. The lack of patches at the time of disclosure necessitates immediate defensive measures. The vulnerability affects only version 1.0 of the product, suggesting that upgrading or patching could resolve the issue once available. This vulnerability is typical of SQL injection flaws where input validation is insufficient, emphasizing the need for secure coding practices and input sanitization.
Potential Impact
For European organizations using the code-projects Library System 1.0, this vulnerability could lead to unauthorized access to sensitive library data, including user information, borrowing records, and internal communications. Attackers could manipulate or extract data, potentially violating data protection regulations such as GDPR. The integrity of the database could be compromised, leading to corrupted records or denial of service if the database is disrupted. Since the vulnerability is remotely exploitable without authentication, attackers could target multiple organizations en masse. This poses a risk especially to educational institutions, public libraries, and government agencies relying on this system. The exposure could result in reputational damage, regulatory fines, and operational disruptions. The medium severity suggests that while the impact is significant, it may not lead to full system compromise without additional vulnerabilities. However, combined with other weaknesses, it could be part of a larger attack chain. The lack of known exploits currently reduces immediate risk but does not eliminate the threat, especially as exploit code may emerge following public disclosure.
Mitigation Recommendations
Organizations should immediately audit their use of the code-projects Library System to determine if version 1.0 is deployed. If so, they should prioritize upgrading to a patched version once available or apply any vendor-provided mitigations. In the interim, implement strict input validation and sanitization on all parameters, especially the 'ID' parameter in /mail.php, to prevent SQL injection. Employ parameterized queries or prepared statements in the codebase to eliminate direct concatenation of user input into SQL commands. Deploy Web Application Firewalls (WAFs) configured to detect and block SQL injection patterns targeting the affected endpoint. Conduct regular security assessments and code reviews focusing on injection flaws. Monitor logs for suspicious activity related to the /mail.php endpoint and unusual database queries. Restrict database permissions to the minimum necessary to limit the impact of potential exploitation. Educate developers and administrators on secure coding practices to prevent similar vulnerabilities. Finally, maintain an incident response plan to quickly address any exploitation attempts.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-23T09:43:19.494Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6923cf69a532ea377e8d8efd
Added to database: 11/24/2025, 3:22:17 AM
Last enriched: 12/1/2025, 4:26:12 AM
Last updated: 1/8/2026, 10:30:36 PM
Views: 58
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0729: SQL Injection in code-projects Intern Membership Management System
MediumCVE-2025-14436: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in neeraj_slit Brevo for WooCommerce
HighCVE-2025-68718: n/a
MediumCVE-2025-15464: CWE-926 Improper Export of Android Application Components in yintibao Fun Print Mobile
HighCVE-2025-14505: CWE-1240: Use of a Cryptographic Primitive with a Risky Implementation in Elliptic
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.