Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14193: SQL Injection in code-projects Employee Profile Management System

0
Medium
VulnerabilityCVE-2025-14193cvecve-2025-14193
Published: Sun Dec 07 2025 (12/07/2025, 14:02:05 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Employee Profile Management System

Description

A vulnerability was determined in code-projects Employee Profile Management System 1.0. This vulnerability affects unknown code of the file /view_personnel.php. Executing a manipulation of the argument per_id can lead to sql injection. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 22:50:48 UTC

Technical Analysis

CVE-2025-14193 identifies a SQL injection vulnerability in the Employee Profile Management System version 1.0 developed by code-projects. The vulnerability is located in the /view_personnel.php script, specifically in the handling of the per_id parameter. An attacker can remotely manipulate this parameter to inject malicious SQL code, potentially allowing unauthorized access to or modification of the backend database. The vulnerability requires low privileges (PR:L) but no user interaction (UI:N) and no authentication (AT:N) to exploit, increasing its risk profile. The CVSS 4.0 vector indicates the attack is network-based (AV:N), with low complexity (AC:L), and partial impacts on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). The vulnerability does not require special conditions or user interaction, making it accessible to remote attackers. Although the exploit has been publicly disclosed, there are no confirmed reports of active exploitation in the wild. The lack of available patches or updates at the time of disclosure increases the urgency for organizations to implement compensating controls. The vulnerability could allow attackers to extract sensitive employee data, alter personnel records, or disrupt system availability, depending on the database privileges and application logic. The absence of secure coding practices such as parameterized queries or input validation in the affected code is the root cause. Organizations using this system should conduct thorough code reviews and apply input sanitization to mitigate the risk.

Potential Impact

The SQL injection vulnerability in the Employee Profile Management System could lead to unauthorized disclosure of sensitive employee information, including personal and professional data stored in the database. Attackers could also modify or delete records, impacting data integrity and potentially disrupting HR operations. In worst-case scenarios, attackers might escalate privileges or pivot to other internal systems if the database user has excessive permissions. This could result in reputational damage, regulatory non-compliance (especially concerning employee data privacy laws), and operational downtime. Since the vulnerability can be exploited remotely without authentication, it poses a significant risk to any organization using the affected version. However, the overall impact is somewhat limited by the niche deployment of this specific product. Organizations with large employee databases or those in regulated industries are at higher risk due to the sensitivity of the data involved.

Mitigation Recommendations

To mitigate this vulnerability, organizations should first check for any official patches or updates from the vendor and apply them promptly once available. In the absence of patches, implement strict input validation and sanitization on the per_id parameter to ensure only expected numeric or alphanumeric values are accepted. Employ parameterized queries or prepared statements in the application code to prevent SQL injection. Restrict database user privileges to the minimum necessary, avoiding excessive permissions that could be exploited. Monitor database logs and application logs for unusual queries or access patterns related to the per_id parameter. Consider deploying a web application firewall (WAF) with rules designed to detect and block SQL injection attempts targeting this endpoint. Conduct regular security assessments and code reviews focusing on input handling. Finally, educate development teams on secure coding practices to prevent similar vulnerabilities in future releases.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-06T17:18:47.618Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69358a9756f2fcb39f2bcb2f

Added to database: 12/7/2025, 2:09:27 PM

Last enriched: 2/24/2026, 10:50:48 PM

Last updated: 3/24/2026, 6:03:59 AM

Views: 139

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses