Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14590: SQL Injection in code-projects Prison Management System

0
Medium
VulnerabilityCVE-2025-14590cvecve-2025-14590
Published: Sat Dec 13 2025 (12/13/2025, 12:02:06 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Prison Management System

Description

A security vulnerability has been detected in code-projects Prison Management System 2.0. Impacted is an unknown function of the file /admin/search1.php. The manipulation of the argument keyname leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 22:58:41 UTC

Technical Analysis

CVE-2025-14590 is a SQL injection vulnerability identified in the code-projects Prison Management System version 2.0, specifically within the /admin/search1.php file. The vulnerability arises from improper input validation of the 'keyname' parameter, which is directly used in SQL queries without adequate sanitization or parameterization. This allows an unauthenticated remote attacker to inject arbitrary SQL commands, potentially manipulating the database to read, modify, or delete sensitive data. The vulnerability does not require any user interaction or privileges, making it remotely exploitable over the network. The CVSS 4.0 base score is 6.9 (medium), reflecting the moderate impact on confidentiality, integrity, and availability, with low complexity and no authentication required. Although no known exploits are currently active in the wild, the public disclosure of the vulnerability increases the likelihood of exploitation attempts. The affected product is a specialized prison management system, which typically handles sensitive inmate and facility data, making the impact of exploitation potentially severe. No official patches or fixes have been linked yet, so organizations must consider alternative mitigations to reduce risk.

Potential Impact

The SQL injection vulnerability allows attackers to remotely execute arbitrary SQL queries on the backend database of the Prison Management System. This can lead to unauthorized disclosure of sensitive inmate and facility information, unauthorized modification or deletion of records, and potential disruption of system availability. Given the critical nature of prison management systems, such data breaches or operational disruptions could have severe consequences, including compromising inmate safety, violating privacy regulations, and undermining institutional trust. The lack of authentication and user interaction requirements increases the attack surface, enabling attackers to exploit the vulnerability at scale if the system is internet-facing or accessible via insecure networks. Organizations worldwide using this system risk data breaches, operational downtime, and regulatory penalties if the vulnerability is exploited.

Mitigation Recommendations

1. Immediate mitigation should include restricting access to the /admin/search1.php endpoint to trusted internal networks or VPNs to reduce exposure. 2. Implement Web Application Firewall (WAF) rules to detect and block SQL injection patterns targeting the 'keyname' parameter. 3. Conduct thorough input validation and sanitization on all user-supplied parameters, especially 'keyname', using parameterized queries or prepared statements to prevent injection. 4. Monitor logs for unusual database query patterns or repeated failed attempts targeting the vulnerable endpoint. 5. Coordinate with the vendor or development team to obtain or develop an official patch or update for the Prison Management System. 6. If patching is delayed, consider isolating the affected system or deploying network segmentation to limit potential lateral movement. 7. Educate administrators about the vulnerability and ensure incident response plans include steps for SQL injection incidents. 8. Regularly back up critical data to enable recovery in case of data tampering or loss.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-12T15:11:55.812Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693d5cc238f0070a6566cb2a

Added to database: 12/13/2025, 12:32:02 PM

Last enriched: 2/24/2026, 10:58:41 PM

Last updated: 3/26/2026, 4:16:35 AM

Views: 132

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses