CVE-2025-14193: SQL Injection in code-projects Employee Profile Management System
A vulnerability was determined in code-projects Employee Profile Management System 1.0. This vulnerability affects unknown code of the file /view_personnel.php. Executing a manipulation of the argument per_id can lead to sql injection. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized.
AI Analysis
Technical Summary
CVE-2025-14193 identifies a SQL injection vulnerability in the Employee Profile Management System version 1.0 developed by code-projects. The vulnerability is located in the /view_personnel.php script, specifically in the handling of the per_id parameter. An attacker can remotely manipulate this parameter to inject malicious SQL code, potentially allowing unauthorized access to or modification of the backend database. The vulnerability requires low privileges (PR:L) but no user interaction (UI:N) and no authentication (AT:N) to exploit, increasing its risk profile. The CVSS 4.0 vector indicates the attack is network-based (AV:N), with low complexity (AC:L), and partial impacts on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). The vulnerability does not require special conditions or user interaction, making it accessible to remote attackers. Although the exploit has been publicly disclosed, there are no confirmed reports of active exploitation in the wild. The lack of available patches or updates at the time of disclosure increases the urgency for organizations to implement compensating controls. The vulnerability could allow attackers to extract sensitive employee data, alter personnel records, or disrupt system availability, depending on the database privileges and application logic. The absence of secure coding practices such as parameterized queries or input validation in the affected code is the root cause. Organizations using this system should conduct thorough code reviews and apply input sanitization to mitigate the risk.
Potential Impact
The SQL injection vulnerability in the Employee Profile Management System could lead to unauthorized disclosure of sensitive employee information, including personal and professional data stored in the database. Attackers could also modify or delete records, impacting data integrity and potentially disrupting HR operations. In worst-case scenarios, attackers might escalate privileges or pivot to other internal systems if the database user has excessive permissions. This could result in reputational damage, regulatory non-compliance (especially concerning employee data privacy laws), and operational downtime. Since the vulnerability can be exploited remotely without authentication, it poses a significant risk to any organization using the affected version. However, the overall impact is somewhat limited by the niche deployment of this specific product. Organizations with large employee databases or those in regulated industries are at higher risk due to the sensitivity of the data involved.
Mitigation Recommendations
To mitigate this vulnerability, organizations should first check for any official patches or updates from the vendor and apply them promptly once available. In the absence of patches, implement strict input validation and sanitization on the per_id parameter to ensure only expected numeric or alphanumeric values are accepted. Employ parameterized queries or prepared statements in the application code to prevent SQL injection. Restrict database user privileges to the minimum necessary, avoiding excessive permissions that could be exploited. Monitor database logs and application logs for unusual queries or access patterns related to the per_id parameter. Consider deploying a web application firewall (WAF) with rules designed to detect and block SQL injection attempts targeting this endpoint. Conduct regular security assessments and code reviews focusing on input handling. Finally, educate development teams on secure coding practices to prevent similar vulnerabilities in future releases.
Affected Countries
United States, India, United Kingdom, Canada, Australia, Germany, France, Brazil, South Africa, Japan
CVE-2025-14193: SQL Injection in code-projects Employee Profile Management System
Description
A vulnerability was determined in code-projects Employee Profile Management System 1.0. This vulnerability affects unknown code of the file /view_personnel.php. Executing a manipulation of the argument per_id can lead to sql injection. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-14193 identifies a SQL injection vulnerability in the Employee Profile Management System version 1.0 developed by code-projects. The vulnerability is located in the /view_personnel.php script, specifically in the handling of the per_id parameter. An attacker can remotely manipulate this parameter to inject malicious SQL code, potentially allowing unauthorized access to or modification of the backend database. The vulnerability requires low privileges (PR:L) but no user interaction (UI:N) and no authentication (AT:N) to exploit, increasing its risk profile. The CVSS 4.0 vector indicates the attack is network-based (AV:N), with low complexity (AC:L), and partial impacts on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). The vulnerability does not require special conditions or user interaction, making it accessible to remote attackers. Although the exploit has been publicly disclosed, there are no confirmed reports of active exploitation in the wild. The lack of available patches or updates at the time of disclosure increases the urgency for organizations to implement compensating controls. The vulnerability could allow attackers to extract sensitive employee data, alter personnel records, or disrupt system availability, depending on the database privileges and application logic. The absence of secure coding practices such as parameterized queries or input validation in the affected code is the root cause. Organizations using this system should conduct thorough code reviews and apply input sanitization to mitigate the risk.
Potential Impact
The SQL injection vulnerability in the Employee Profile Management System could lead to unauthorized disclosure of sensitive employee information, including personal and professional data stored in the database. Attackers could also modify or delete records, impacting data integrity and potentially disrupting HR operations. In worst-case scenarios, attackers might escalate privileges or pivot to other internal systems if the database user has excessive permissions. This could result in reputational damage, regulatory non-compliance (especially concerning employee data privacy laws), and operational downtime. Since the vulnerability can be exploited remotely without authentication, it poses a significant risk to any organization using the affected version. However, the overall impact is somewhat limited by the niche deployment of this specific product. Organizations with large employee databases or those in regulated industries are at higher risk due to the sensitivity of the data involved.
Mitigation Recommendations
To mitigate this vulnerability, organizations should first check for any official patches or updates from the vendor and apply them promptly once available. In the absence of patches, implement strict input validation and sanitization on the per_id parameter to ensure only expected numeric or alphanumeric values are accepted. Employ parameterized queries or prepared statements in the application code to prevent SQL injection. Restrict database user privileges to the minimum necessary, avoiding excessive permissions that could be exploited. Monitor database logs and application logs for unusual queries or access patterns related to the per_id parameter. Consider deploying a web application firewall (WAF) with rules designed to detect and block SQL injection attempts targeting this endpoint. Conduct regular security assessments and code reviews focusing on input handling. Finally, educate development teams on secure coding practices to prevent similar vulnerabilities in future releases.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-06T17:18:47.618Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69358a9756f2fcb39f2bcb2f
Added to database: 12/7/2025, 2:09:27 PM
Last enriched: 2/24/2026, 10:50:48 PM
Last updated: 3/24/2026, 6:03:59 AM
Views: 139
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.