Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14589: SQL Injection in code-projects Prison Management System

0
Medium
VulnerabilityCVE-2025-14589cvecve-2025-14589
Published: Sat Dec 13 2025 (12/13/2025, 10:32:07 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Prison Management System

Description

A weakness has been identified in code-projects Prison Management System 2.0. This issue affects some unknown processing of the file /admin/search.php. Executing manipulation of the argument keyname can lead to sql injection. The attack may be performed from remote. The exploit has been made available to the public and could be exploited.

AI-Powered Analysis

AILast updated: 12/13/2025, 10:52:21 UTC

Technical Analysis

CVE-2025-14589 identifies a SQL injection vulnerability in the code-projects Prison Management System version 2.0, specifically affecting the /admin/search.php endpoint. The vulnerability is triggered by manipulation of the 'keyname' parameter, which is not properly sanitized before being used in SQL queries. This flaw allows remote attackers to inject arbitrary SQL commands, potentially leading to unauthorized data retrieval, modification, or deletion within the backend database. The attack vector requires no user interaction and no authentication, making it accessible to any remote adversary aware of the vulnerability. The CVSS 4.0 base score is 5.3 (medium), reflecting the moderate impact on confidentiality, integrity, and availability, with low complexity and no privileges required. Although no exploits have been observed in the wild, the public availability of exploit code increases the likelihood of exploitation attempts. The vulnerability poses a significant risk to prison management systems, which handle sensitive inmate and operational data, and could lead to data breaches, manipulation of records, or disruption of prison operations. The lack of official patches or vendor advisories at this time necessitates immediate mitigation efforts by system administrators.

Potential Impact

For European organizations, particularly those managing correctional facilities, this vulnerability could lead to severe consequences including unauthorized disclosure of sensitive inmate information, alteration of records, or denial of service through database manipulation. Such impacts could undermine operational integrity, violate data protection regulations like GDPR, and damage public trust. The ability to exploit this vulnerability remotely without authentication increases the attack surface significantly. Given the critical nature of prison management systems, any compromise could have cascading effects on security and safety within correctional institutions. Additionally, data breaches involving personal information of inmates or staff could lead to legal and regulatory repercussions for affected organizations. The medium severity score indicates a moderate but tangible risk that requires timely remediation to prevent exploitation.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately implement input validation and sanitization on the 'keyname' parameter to prevent SQL injection. Employing parameterized queries or prepared statements in the application code is essential to eliminate direct injection risks. Restricting access to the /admin/search.php endpoint through network-level controls such as IP whitelisting or VPN access can reduce exposure. Monitoring and logging access to the admin interface should be enhanced to detect suspicious activities. Since no official patch is currently available, organizations should consider temporary compensating controls such as web application firewalls (WAFs) configured to detect and block SQL injection attempts targeting this parameter. Regular security assessments and code reviews should be conducted to identify and remediate similar vulnerabilities. Finally, organizations should stay alert for vendor updates or patches and apply them promptly once released.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-12T15:11:52.831Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693d41eacfba580c44f20e34

Added to database: 12/13/2025, 10:37:30 AM

Last enriched: 12/13/2025, 10:52:21 AM

Last updated: 12/13/2025, 1:56:24 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats