Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14211: SQL Injection in projectworlds Advanced Library Management System

0
Medium
VulnerabilityCVE-2025-14211cvecve-2025-14211
Published: Mon Dec 08 2025 (12/08/2025, 02:32:06 UTC)
Source: CVE Database V5
Vendor/Project: projectworlds
Product: Advanced Library Management System

Description

CVE-2025-14211 is a medium-severity SQL Injection vulnerability in projectworlds Advanced Library Management System version 1. 0, specifically in the /delete_book. php file via the book_id parameter. The flaw allows unauthenticated remote attackers to manipulate SQL queries, potentially leading to data leakage or modification. No user interaction or privileges are required, and the exploit code is publicly available, increasing the risk of exploitation. Although no known exploits are currently active in the wild, the vulnerability poses a significant threat to confidentiality and integrity of affected systems. European organizations using this library management system should prioritize patching or mitigating this issue. Countries with higher adoption of projectworlds products or with critical library infrastructure are at greater risk. Immediate mitigation steps include input validation, use of parameterized queries, and network-level protections to restrict access to vulnerable endpoints.

AI-Powered Analysis

AILast updated: 12/15/2025, 05:01:59 UTC

Technical Analysis

CVE-2025-14211 identifies a SQL Injection vulnerability in the Advanced Library Management System (ALMS) version 1.0 developed by projectworlds. The vulnerability resides in the /delete_book.php script, where the book_id parameter is improperly sanitized, allowing attackers to inject malicious SQL code. This injection can be performed remotely without authentication or user interaction, enabling attackers to manipulate backend database queries. Potential impacts include unauthorized data retrieval, modification, or deletion, which compromises confidentiality and integrity of the library management data. The vulnerability has a CVSS 4.0 base score of 6.9, indicating medium severity, with an attack vector of network (remote) and low attack complexity. The exploit is publicly available, increasing the likelihood of exploitation despite no current known active attacks. The lack of authentication and user interaction requirements makes this vulnerability particularly dangerous for exposed systems. The Advanced Library Management System is typically used by educational institutions and public libraries, which may store sensitive patron and inventory data. The vulnerability does not affect system availability directly but can lead to significant data breaches or corruption. No official patches have been released yet, and no mitigations are documented, emphasizing the need for immediate defensive measures.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to unauthorized disclosure of sensitive patron information, manipulation or deletion of library records, and potential disruption of library services. Educational institutions and public libraries relying on projectworlds ALMS 1.0 may face reputational damage, regulatory penalties under GDPR for data breaches, and operational challenges. The ability to exploit remotely without authentication increases the attack surface, especially for systems exposed to the internet or inadequately segmented networks. Confidentiality and integrity impacts are significant, as attackers could extract personal data or alter records. While availability impact is limited, the indirect consequences of data corruption or loss could disrupt library operations. The public availability of exploit code raises the risk of opportunistic attacks, including by cybercriminals or hacktivists targeting cultural or educational infrastructure in Europe. Organizations may also face compliance risks if they fail to secure personal data adequately. Overall, the vulnerability poses a moderate but tangible threat to European library and educational sectors using this software.

Mitigation Recommendations

1. Immediate implementation of input validation and sanitization on the book_id parameter to prevent SQL injection. 2. Refactor the /delete_book.php code to use parameterized queries or prepared statements to eliminate direct SQL concatenation. 3. Restrict network access to the vulnerable endpoint by implementing firewall rules or web application firewalls (WAF) that can detect and block SQL injection attempts. 4. Conduct a thorough audit of all input handling in the ALMS to identify and remediate similar vulnerabilities. 5. Monitor logs for suspicious activity targeting /delete_book.php or unusual database queries. 6. If patching is not immediately possible, consider isolating the ALMS server from external networks or placing it behind VPNs to limit exposure. 7. Educate IT staff and administrators about the vulnerability and the importance of timely updates and secure coding practices. 8. Engage with the vendor (projectworlds) to request an official patch or security update. 9. Implement regular backups of the database to enable recovery in case of data tampering. 10. Review and update incident response plans to include scenarios involving SQL injection attacks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-07T08:12:26.973Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6936430628b66c5f4ed0005d

Added to database: 12/8/2025, 3:16:22 AM

Last enriched: 12/15/2025, 5:01:59 AM

Last updated: 2/4/2026, 10:00:18 AM

Views: 88

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats