Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14203: SQL Injection in code-projects Question Paper Generator

0
Medium
VulnerabilityCVE-2025-14203cvecve-2025-14203
Published: Sun Dec 07 2025 (12/07/2025, 21:32:06 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Question Paper Generator

Description

CVE-2025-14203 is a medium severity SQL Injection vulnerability found in version 1. 0 of the code-projects Question Paper Generator, specifically in the /selectquestionuser. php file. The flaw arises from improper sanitization of the 'subid' parameter, allowing remote attackers to manipulate SQL queries without authentication or user interaction. Exploitation can lead to partial compromise of confidentiality, integrity, and availability of the underlying database. Although no known exploits are currently active in the wild, a public exploit has been published, increasing the risk of attack. The vulnerability affects only version 1. 0 of the product, which is a niche educational tool. European organizations using this software, especially educational institutions, could face data breaches or service disruptions. Mitigation requires immediate input validation, parameterized queries, and applying vendor patches once available.

AI-Powered Analysis

AILast updated: 12/15/2025, 04:59:09 UTC

Technical Analysis

CVE-2025-14203 is an SQL Injection vulnerability identified in the code-projects Question Paper Generator version 1.0. The vulnerability exists in the /selectquestionuser.php script, where the 'subid' parameter is improperly sanitized, allowing an attacker to inject malicious SQL code. This injection flaw enables remote attackers to manipulate backend database queries without requiring authentication or user interaction, which can lead to unauthorized data access, modification, or deletion. The vulnerability has a CVSS 4.0 base score of 5.3, indicating medium severity, with an attack vector classified as network-based and low attack complexity. The impact on confidentiality, integrity, and availability is limited but non-negligible, as the vulnerability could allow attackers to extract sensitive data or disrupt service availability. Although no active exploits have been observed in the wild, a public exploit has been published, increasing the likelihood of exploitation attempts. The affected product is a niche educational software tool used for generating question papers, which may limit the scope of affected systems but still poses a risk to organizations relying on it for academic operations. No official patches have been released yet, so mitigation currently relies on implementing secure coding practices such as input validation and prepared statements.

Potential Impact

For European organizations, particularly educational institutions using the code-projects Question Paper Generator, this vulnerability could lead to unauthorized access to sensitive academic data, including exam questions and user information. Data confidentiality could be compromised, potentially resulting in exam content leaks or manipulation. Integrity of stored data may be affected if attackers alter question banks or user records, undermining trust in academic processes. Availability could be impacted if attackers execute destructive SQL commands or cause database errors, disrupting the generation of exam papers. Although the product is niche, institutions relying on it for critical academic functions could face operational disruptions and reputational damage. The presence of a public exploit increases the risk of targeted attacks, especially in regions with higher adoption of this software. Compliance with data protection regulations such as GDPR may also be jeopardized if sensitive personal data is exposed.

Mitigation Recommendations

European organizations should immediately audit their use of the code-projects Question Paper Generator to identify affected installations. Until an official patch is released, implement strict input validation on the 'subid' parameter to ensure only expected numeric or alphanumeric values are accepted. Refactor the vulnerable code to use parameterized SQL queries or prepared statements to prevent injection. Restrict network access to the application to trusted users and environments, employing web application firewalls (WAFs) with SQL injection detection rules to block malicious payloads. Monitor logs for suspicious query patterns or repeated access attempts targeting the vulnerable endpoint. Educate developers and administrators on secure coding practices and the importance of timely patching. Once the vendor releases a patch, prioritize its deployment. Additionally, conduct regular security assessments and penetration tests focusing on injection vulnerabilities in similar applications.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-07T07:54:47.365Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6935f4ac4dfbcbe9ef77b262

Added to database: 12/7/2025, 9:42:04 PM

Last enriched: 12/15/2025, 4:59:09 AM

Last updated: 2/4/2026, 8:08:05 PM

Views: 82

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats