CVE-2025-14203: SQL Injection in code-projects Question Paper Generator
CVE-2025-14203 is a medium severity SQL Injection vulnerability found in version 1. 0 of the code-projects Question Paper Generator, specifically in the /selectquestionuser. php file. The flaw arises from improper sanitization of the 'subid' parameter, allowing remote attackers to manipulate SQL queries without authentication or user interaction. Exploitation can lead to partial compromise of confidentiality, integrity, and availability of the underlying database. Although no known exploits are currently active in the wild, a public exploit has been published, increasing the risk of attack. The vulnerability affects only version 1. 0 of the product, which is a niche educational tool. European organizations using this software, especially educational institutions, could face data breaches or service disruptions. Mitigation requires immediate input validation, parameterized queries, and applying vendor patches once available.
AI Analysis
Technical Summary
CVE-2025-14203 is an SQL Injection vulnerability identified in the code-projects Question Paper Generator version 1.0. The vulnerability exists in the /selectquestionuser.php script, where the 'subid' parameter is improperly sanitized, allowing an attacker to inject malicious SQL code. This injection flaw enables remote attackers to manipulate backend database queries without requiring authentication or user interaction, which can lead to unauthorized data access, modification, or deletion. The vulnerability has a CVSS 4.0 base score of 5.3, indicating medium severity, with an attack vector classified as network-based and low attack complexity. The impact on confidentiality, integrity, and availability is limited but non-negligible, as the vulnerability could allow attackers to extract sensitive data or disrupt service availability. Although no active exploits have been observed in the wild, a public exploit has been published, increasing the likelihood of exploitation attempts. The affected product is a niche educational software tool used for generating question papers, which may limit the scope of affected systems but still poses a risk to organizations relying on it for academic operations. No official patches have been released yet, so mitigation currently relies on implementing secure coding practices such as input validation and prepared statements.
Potential Impact
For European organizations, particularly educational institutions using the code-projects Question Paper Generator, this vulnerability could lead to unauthorized access to sensitive academic data, including exam questions and user information. Data confidentiality could be compromised, potentially resulting in exam content leaks or manipulation. Integrity of stored data may be affected if attackers alter question banks or user records, undermining trust in academic processes. Availability could be impacted if attackers execute destructive SQL commands or cause database errors, disrupting the generation of exam papers. Although the product is niche, institutions relying on it for critical academic functions could face operational disruptions and reputational damage. The presence of a public exploit increases the risk of targeted attacks, especially in regions with higher adoption of this software. Compliance with data protection regulations such as GDPR may also be jeopardized if sensitive personal data is exposed.
Mitigation Recommendations
European organizations should immediately audit their use of the code-projects Question Paper Generator to identify affected installations. Until an official patch is released, implement strict input validation on the 'subid' parameter to ensure only expected numeric or alphanumeric values are accepted. Refactor the vulnerable code to use parameterized SQL queries or prepared statements to prevent injection. Restrict network access to the application to trusted users and environments, employing web application firewalls (WAFs) with SQL injection detection rules to block malicious payloads. Monitor logs for suspicious query patterns or repeated access attempts targeting the vulnerable endpoint. Educate developers and administrators on secure coding practices and the importance of timely patching. Once the vendor releases a patch, prioritize its deployment. Additionally, conduct regular security assessments and penetration tests focusing on injection vulnerabilities in similar applications.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands
CVE-2025-14203: SQL Injection in code-projects Question Paper Generator
Description
CVE-2025-14203 is a medium severity SQL Injection vulnerability found in version 1. 0 of the code-projects Question Paper Generator, specifically in the /selectquestionuser. php file. The flaw arises from improper sanitization of the 'subid' parameter, allowing remote attackers to manipulate SQL queries without authentication or user interaction. Exploitation can lead to partial compromise of confidentiality, integrity, and availability of the underlying database. Although no known exploits are currently active in the wild, a public exploit has been published, increasing the risk of attack. The vulnerability affects only version 1. 0 of the product, which is a niche educational tool. European organizations using this software, especially educational institutions, could face data breaches or service disruptions. Mitigation requires immediate input validation, parameterized queries, and applying vendor patches once available.
AI-Powered Analysis
Technical Analysis
CVE-2025-14203 is an SQL Injection vulnerability identified in the code-projects Question Paper Generator version 1.0. The vulnerability exists in the /selectquestionuser.php script, where the 'subid' parameter is improperly sanitized, allowing an attacker to inject malicious SQL code. This injection flaw enables remote attackers to manipulate backend database queries without requiring authentication or user interaction, which can lead to unauthorized data access, modification, or deletion. The vulnerability has a CVSS 4.0 base score of 5.3, indicating medium severity, with an attack vector classified as network-based and low attack complexity. The impact on confidentiality, integrity, and availability is limited but non-negligible, as the vulnerability could allow attackers to extract sensitive data or disrupt service availability. Although no active exploits have been observed in the wild, a public exploit has been published, increasing the likelihood of exploitation attempts. The affected product is a niche educational software tool used for generating question papers, which may limit the scope of affected systems but still poses a risk to organizations relying on it for academic operations. No official patches have been released yet, so mitigation currently relies on implementing secure coding practices such as input validation and prepared statements.
Potential Impact
For European organizations, particularly educational institutions using the code-projects Question Paper Generator, this vulnerability could lead to unauthorized access to sensitive academic data, including exam questions and user information. Data confidentiality could be compromised, potentially resulting in exam content leaks or manipulation. Integrity of stored data may be affected if attackers alter question banks or user records, undermining trust in academic processes. Availability could be impacted if attackers execute destructive SQL commands or cause database errors, disrupting the generation of exam papers. Although the product is niche, institutions relying on it for critical academic functions could face operational disruptions and reputational damage. The presence of a public exploit increases the risk of targeted attacks, especially in regions with higher adoption of this software. Compliance with data protection regulations such as GDPR may also be jeopardized if sensitive personal data is exposed.
Mitigation Recommendations
European organizations should immediately audit their use of the code-projects Question Paper Generator to identify affected installations. Until an official patch is released, implement strict input validation on the 'subid' parameter to ensure only expected numeric or alphanumeric values are accepted. Refactor the vulnerable code to use parameterized SQL queries or prepared statements to prevent injection. Restrict network access to the application to trusted users and environments, employing web application firewalls (WAFs) with SQL injection detection rules to block malicious payloads. Monitor logs for suspicious query patterns or repeated access attempts targeting the vulnerable endpoint. Educate developers and administrators on secure coding practices and the importance of timely patching. Once the vendor releases a patch, prioritize its deployment. Additionally, conduct regular security assessments and penetration tests focusing on injection vulnerabilities in similar applications.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-07T07:54:47.365Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6935f4ac4dfbcbe9ef77b262
Added to database: 12/7/2025, 9:42:04 PM
Last enriched: 12/15/2025, 4:59:09 AM
Last updated: 2/4/2026, 8:08:05 PM
Views: 82
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2024-37301: CWE-1336: Improper Neutralization of Special Elements Used in a Template Engine in adfinis document-merge-service
HighCVE-2026-25161: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in AlistGo alist
HighCVE-2026-25160: CWE-295: Improper Certificate Validation in AlistGo alist
CriticalCVE-2026-25145: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in chainguard-dev melange
MediumCVE-2026-25143: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in chainguard-dev melange
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.