Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14527: SQL Injection in projectworlds Advanced Library Management System

0
Medium
VulnerabilityCVE-2025-14527cvecve-2025-14527
Published: Thu Dec 11 2025 (12/11/2025, 17:02:09 UTC)
Source: CVE Database V5
Vendor/Project: projectworlds
Product: Advanced Library Management System

Description

A weakness has been identified in projectworlds Advanced Library Management System 1.0. This vulnerability affects unknown code of the file /view_book.php. Executing a manipulation of the argument book_id can lead to sql injection. The attack can be executed remotely. The exploit has been made available to the public and could be used for attacks.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 22:55:39 UTC

Technical Analysis

CVE-2025-14527 identifies a SQL Injection vulnerability in projectworlds Advanced Library Management System version 1.0. The vulnerability exists in the /view_book.php script, where the book_id parameter is improperly sanitized, allowing an attacker to inject malicious SQL code. This injection can be exploited remotely without requiring authentication or user interaction, making it highly accessible to attackers. The flaw enables attackers to manipulate backend database queries, potentially leading to unauthorized data disclosure, data modification, or even full system compromise depending on the database privileges. The CVSS 4.0 score of 6.9 reflects a medium severity, considering the vulnerability's ease of exploitation (network attack vector, no privileges or user interaction needed) but limited impact scope (low confidentiality, integrity, and availability impact). No official patches have been released yet, and no active exploitation has been reported, but a public exploit is available, increasing the likelihood of future attacks. The vulnerability affects only version 1.0 of the software, which is typically used by libraries or educational institutions for managing book inventories and lending processes. The lack of secure coding practices in input validation for the book_id parameter is the root cause. Organizations running this software should urgently review their input handling and apply mitigations or patches once available.

Potential Impact

The impact of this SQL Injection vulnerability can be significant for organizations using projectworlds Advanced Library Management System 1.0. Attackers exploiting this flaw can gain unauthorized access to sensitive library data, including user information, book inventories, and transaction records. They may also alter or delete data, disrupting library operations and compromising data integrity. In worst-case scenarios, attackers could escalate privileges within the database, potentially gaining broader access to backend systems. This could lead to data breaches, loss of trust, and operational downtime. Since the exploit requires no authentication and can be executed remotely, the attack surface is broad, increasing risk especially for publicly accessible library management portals. The availability of a public exploit further elevates the threat, as less skilled attackers can leverage it. Although no active exploitation is reported yet, the presence of a public exploit and the medium severity rating suggest organizations should not delay mitigation. The impact is particularly critical for institutions that rely heavily on this software for daily operations and data management.

Mitigation Recommendations

To mitigate CVE-2025-14527, organizations should immediately implement input validation and parameterized queries or prepared statements to prevent SQL Injection in the /view_book.php file, specifically sanitizing the book_id parameter. If source code modification is possible, refactor the code to use secure database access methods that separate code from data. Until an official patch is released by projectworlds, consider deploying a Web Application Firewall (WAF) with rules to detect and block SQL Injection attempts targeting the book_id parameter. Conduct thorough code reviews and penetration testing focusing on input handling in all user-facing scripts. Monitor logs for unusual database query patterns or repeated failed attempts to access book_id parameters. Limit database user privileges to the minimum necessary to reduce potential damage from exploitation. If feasible, restrict external access to the library management system to trusted networks or VPNs. Finally, maintain an incident response plan to quickly address any detected exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-11T08:27:09.801Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693b21667d4c6f31f7c3537e

Added to database: 12/11/2025, 7:54:14 PM

Last enriched: 2/24/2026, 10:55:39 PM

Last updated: 3/26/2026, 8:30:12 AM

Views: 150

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses