Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14222: SQL Injection in code-projects Employee Profile Management System

0
Medium
VulnerabilityCVE-2025-14222cvecve-2025-14222
Published: Mon Dec 08 2025 (12/08/2025, 07:32:05 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Employee Profile Management System

Description

A flaw has been found in code-projects Employee Profile Management System 1.0. Affected is an unknown function of the file /print_personnel_report.php. This manipulation of the argument per_id causes sql injection. The attack may be initiated remotely. The exploit has been published and may be used.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 22:53:27 UTC

Technical Analysis

CVE-2025-14222 identifies a SQL injection vulnerability in the Employee Profile Management System version 1.0 developed by code-projects. The vulnerability is located in the /print_personnel_report.php script, specifically in the handling of the per_id parameter. This parameter is susceptible to SQL injection due to insufficient input validation or sanitization, allowing an attacker to manipulate SQL queries executed by the application. The attack vector is remote network access, and exploitation requires low privileges (PR:L), no user interaction (UI:N), and no authentication (AT:N), making it relatively accessible to attackers with limited access. The CVSS 4.0 score of 5.3 reflects a medium severity, considering the partial impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). The vulnerability does not affect system components beyond the application scope (SC:N) and does not propagate beyond the vulnerable system (SI:N). While no known exploits are currently active in the wild, the public availability of an exploit increases the likelihood of exploitation attempts. The flaw could allow attackers to extract sensitive employee data, modify records, or disrupt reporting functions, potentially leading to data breaches or operational disruptions. The absence of official patches necessitates immediate mitigation efforts by organizations using this software. The vulnerability highlights the critical need for secure coding practices, especially input validation in web applications handling sensitive personnel data.

Potential Impact

The SQL injection vulnerability in the Employee Profile Management System can have significant impacts on organizations globally. Exploitation can lead to unauthorized disclosure of sensitive employee information, including personal identifiers and employment details, compromising confidentiality. Attackers may also alter or delete data, affecting data integrity and potentially disrupting HR operations and reporting functions. This could result in operational downtime, loss of trust, regulatory non-compliance, and financial penalties. Since the vulnerability can be exploited remotely without user interaction and requires only low privileges, it broadens the attack surface and increases the risk of automated or targeted attacks. Organizations relying on this system for personnel management, especially those handling large volumes of sensitive data, face heightened risks of insider data exposure or external breaches. The lack of patches further exacerbates the threat, necessitating immediate defensive measures to prevent exploitation and data loss.

Mitigation Recommendations

To mitigate CVE-2025-14222, organizations should first verify if they are running version 1.0 of the code-projects Employee Profile Management System and specifically use the /print_personnel_report.php functionality. In the absence of an official patch, immediate steps include implementing web application firewall (WAF) rules to detect and block SQL injection attempts targeting the per_id parameter. Input validation should be enforced at the application level by sanitizing and parameterizing all database queries to prevent injection. Restrict database user permissions to the minimum necessary to limit the impact of a successful injection. Conduct thorough code reviews and penetration testing focused on input handling and SQL query construction. Monitor logs for suspicious query patterns or repeated access attempts to the vulnerable endpoint. If feasible, isolate the affected system from external networks or restrict access to trusted IP addresses until a patch or update is available. Engage with the vendor or community for updates or patches and plan for timely application once released. Additionally, educate developers on secure coding practices to prevent similar vulnerabilities in future releases.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-07T15:32:12.581Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6936810245c0181069558092

Added to database: 12/8/2025, 7:40:50 AM

Last enriched: 2/24/2026, 10:53:27 PM

Last updated: 3/25/2026, 1:25:58 AM

Views: 114

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses