Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14589: SQL Injection in code-projects Prison Management System

0
Medium
VulnerabilityCVE-2025-14589cvecve-2025-14589
Published: Sat Dec 13 2025 (12/13/2025, 10:32:07 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Prison Management System

Description

A weakness has been identified in code-projects Prison Management System 2.0. This issue affects some unknown processing of the file /admin/search.php. Executing a manipulation of the argument keyname can lead to sql injection. The attack may be performed from remote. The exploit has been made available to the public and could be used for attacks.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 22:58:28 UTC

Technical Analysis

CVE-2025-14589 identifies a SQL injection vulnerability in the code-projects Prison Management System version 2.0. The flaw exists in the /admin/search.php endpoint, where the 'keyname' parameter is not properly sanitized or validated, allowing attackers to inject arbitrary SQL commands. This vulnerability can be exploited remotely without authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The attack complexity is low, but a low level of privileges is required, suggesting that some form of limited access to the admin interface or credentials might be necessary. Successful exploitation could lead to unauthorized disclosure, modification, or deletion of sensitive data stored in the backend database, potentially compromising the integrity and confidentiality of prison management records. Although no active exploitation has been reported, the public availability of exploit code increases the likelihood of attacks. The vulnerability does not require special conditions such as user interaction or physical access, making it a significant risk for affected installations. The absence of official patches at the time of publication necessitates immediate mitigation efforts by administrators. The Prison Management System is a specialized product, so the affected user base is limited but critical due to the sensitivity of the data involved.

Potential Impact

The impact of CVE-2025-14589 is significant for organizations using the affected Prison Management System, as it can lead to unauthorized access to sensitive inmate data, operational details, and administrative records. Exploitation could result in data breaches, manipulation of records, or disruption of prison management operations, potentially affecting security and safety. Confidentiality is at risk due to possible data leakage, integrity is compromised by unauthorized data modification, and availability could be affected if attackers alter or delete critical information. Given the nature of the system, such breaches could have legal, reputational, and operational consequences for correctional institutions. The medium CVSS score reflects the balance between the ease of exploitation and the requirement for some privilege level. However, the public availability of exploit code increases the urgency to address this vulnerability promptly. Organizations worldwide that manage prison systems or similar correctional infrastructure using this software are at risk, especially those with limited cybersecurity resources.

Mitigation Recommendations

To mitigate CVE-2025-14589, organizations should immediately review and restrict access to the /admin/search.php endpoint, ensuring only trusted administrators can reach it. Implement strict input validation and sanitization for the 'keyname' parameter, preferably using parameterized queries or prepared statements to prevent SQL injection. If source code access is available, refactor the vulnerable code to eliminate direct concatenation of user inputs into SQL queries. Monitor logs for suspicious query patterns or repeated failed attempts targeting the search functionality. Employ web application firewalls (WAFs) with SQL injection detection rules to provide an additional layer of defense. Since no official patches are currently available, consider isolating the affected system from external networks or limiting network access until a vendor patch or update is released. Conduct regular security assessments and penetration tests focusing on injection flaws. Finally, maintain an incident response plan tailored to data breaches involving sensitive correctional data.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-12T15:11:52.831Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693d41eacfba580c44f20e34

Added to database: 12/13/2025, 10:37:30 AM

Last enriched: 2/24/2026, 10:58:28 PM

Last updated: 3/25/2026, 3:07:14 PM

Views: 116

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses