Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14589: SQL Injection in code-projects Prison Management System

0
Medium
VulnerabilityCVE-2025-14589cvecve-2025-14589
Published: Sat Dec 13 2025 (12/13/2025, 10:32:07 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Prison Management System

Description

A weakness has been identified in code-projects Prison Management System 2.0. This issue affects some unknown processing of the file /admin/search.php. Executing manipulation of the argument keyname can lead to sql injection. The attack may be performed from remote. The exploit has been made available to the public and could be exploited.

AI-Powered Analysis

AILast updated: 12/20/2025, 11:35:06 UTC

Technical Analysis

CVE-2025-14589 identifies a SQL injection vulnerability in version 2.0 of the code-projects Prison Management System, specifically within the /admin/search.php endpoint. The vulnerability stems from insufficient input validation or sanitization of the 'keyname' parameter, which is used in SQL queries without proper escaping or parameterization. This flaw allows a remote attacker to inject arbitrary SQL code by manipulating the 'keyname' argument, potentially enabling unauthorized access to the underlying database. The attack vector is network-based (AV:N), with low attack complexity (AC:L), requiring no user interaction (UI:N) and only low privileges (PR:L), indicating that an attacker with limited access could exploit this flaw. The impact on confidentiality, integrity, and availability is low individually but collectively can be significant, as attackers may extract sensitive data, modify records, or disrupt system operations. The vulnerability does not require authentication, increasing its risk profile. Although no active exploitation has been reported, the availability of a public exploit increases the likelihood of future attacks. The Prison Management System is critical infrastructure software used to manage inmate data and operations, making this vulnerability particularly sensitive. The lack of a patch link suggests that remediation is pending or must be implemented by users themselves. The CVSS 4.0 vector and score of 5.3 classify this as a medium severity issue, reflecting moderate risk but necessitating timely mitigation.

Potential Impact

For European organizations, especially those managing correctional facilities, this vulnerability poses a risk of unauthorized data disclosure, including sensitive inmate information, operational details, and administrative data. Exploitation could lead to data breaches violating privacy regulations such as GDPR, resulting in legal and reputational consequences. Integrity compromise could allow attackers to alter inmate records or system configurations, potentially disrupting prison operations or enabling unauthorized access. Availability impacts could arise if attackers execute destructive SQL commands, causing system downtime or data loss. Given the critical nature of prison management systems in maintaining security and order, any disruption could have broader societal implications. The medium severity suggests that while immediate catastrophic failure is unlikely, the vulnerability still represents a significant threat vector that must be addressed to prevent escalation or chained attacks. European entities relying on this software must consider the regulatory and operational risks associated with this vulnerability.

Mitigation Recommendations

To mitigate CVE-2025-14589, organizations should immediately audit and sanitize all inputs to the /admin/search.php endpoint, specifically the 'keyname' parameter. Implement parameterized queries or prepared statements to prevent SQL injection. Restrict access to the admin interface using network segmentation, VPNs, or IP whitelisting to limit exposure. Monitor logs for unusual query patterns or repeated failed attempts indicative of exploitation attempts. Apply web application firewalls (WAF) with rules targeting SQL injection signatures. Since no official patch is currently linked, organizations should engage with the vendor for updates or consider custom patches. Conduct security testing and code reviews to identify similar injection points. Train administrators on secure coding and operational security practices. Finally, ensure regular backups and incident response plans are in place to recover from potential data integrity or availability incidents.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-12T15:11:52.831Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693d41eacfba580c44f20e34

Added to database: 12/13/2025, 10:37:30 AM

Last enriched: 12/20/2025, 11:35:06 AM

Last updated: 2/7/2026, 3:42:05 AM

Views: 73

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats