CVE-2025-14645: SQL Injection in code-projects Student File Management System
A vulnerability was identified in code-projects Student File Management System 1.0. This affects an unknown function of the file /admin/delete_user.php. The manipulation of the argument user_id leads to sql injection. The attack is possible to be carried out remotely. The exploit is publicly available and might be used.
AI Analysis
Technical Summary
CVE-2025-14645 identifies a SQL injection vulnerability in the Student File Management System version 1.0 developed by code-projects. The flaw exists in the /admin/delete_user.php script, where the user_id parameter is not properly sanitized before being used in SQL queries. This allows an unauthenticated remote attacker to inject arbitrary SQL commands, potentially manipulating the backend database. The vulnerability does not require any privileges or user interaction, making it highly accessible for exploitation. The CVSS 4.0 base score is 6.9, reflecting medium severity, with attack vector as network (remote), low attack complexity, no privileges or user interaction needed, and low impact on confidentiality, integrity, and availability individually, but combined impact is notable. The vulnerability can lead to unauthorized data disclosure, modification, or deletion, which is critical in a student management context where sensitive personal and academic data is stored. No patches or official fixes are currently linked, but public exploit code is available, increasing the urgency for mitigation. The vulnerability affects only version 1.0 of the product, which may limit the scope but still poses a significant risk to organizations using this version.
Potential Impact
For European organizations, particularly educational institutions and administrative bodies using the affected Student File Management System 1.0, this vulnerability could lead to unauthorized access to sensitive student data, including personal identification and academic records. The SQL injection could allow attackers to extract confidential information, alter or delete user records, or disrupt system availability by corrupting database contents. This compromises data confidentiality, integrity, and availability, potentially violating GDPR and other data protection regulations, leading to legal and reputational consequences. The remote and unauthenticated nature of the exploit increases the risk of widespread attacks, especially in environments with internet-facing administrative portals. The lack of known active exploitation currently provides a window for proactive defense, but the availability of public exploit code means attackers could rapidly weaponize this vulnerability. The impact extends beyond data loss to potential operational disruption in educational services, affecting students, staff, and administrative workflows.
Mitigation Recommendations
Organizations should immediately audit their use of the code-projects Student File Management System and identify any instances of version 1.0 in use. Since no official patch is currently available, implement the following mitigations: 1) Restrict access to the /admin/delete_user.php endpoint using network-level controls such as VPNs, IP whitelisting, or firewall rules to limit exposure to trusted administrators only. 2) Employ web application firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the user_id parameter. 3) Review and update the application code to use parameterized queries or prepared statements for all database interactions, especially those involving user-supplied input. 4) Implement rigorous input validation and sanitization on all parameters, particularly user_id, to reject malicious payloads. 5) Monitor logs for unusual database query patterns or repeated access attempts to the vulnerable endpoint. 6) Plan for an upgrade or replacement of the Student File Management System to a version without this vulnerability or an alternative product. 7) Conduct security awareness training for administrators to recognize and report suspicious activities. These steps will reduce the attack surface and mitigate the risk until an official patch is released.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-14645: SQL Injection in code-projects Student File Management System
Description
A vulnerability was identified in code-projects Student File Management System 1.0. This affects an unknown function of the file /admin/delete_user.php. The manipulation of the argument user_id leads to sql injection. The attack is possible to be carried out remotely. The exploit is publicly available and might be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-14645 identifies a SQL injection vulnerability in the Student File Management System version 1.0 developed by code-projects. The flaw exists in the /admin/delete_user.php script, where the user_id parameter is not properly sanitized before being used in SQL queries. This allows an unauthenticated remote attacker to inject arbitrary SQL commands, potentially manipulating the backend database. The vulnerability does not require any privileges or user interaction, making it highly accessible for exploitation. The CVSS 4.0 base score is 6.9, reflecting medium severity, with attack vector as network (remote), low attack complexity, no privileges or user interaction needed, and low impact on confidentiality, integrity, and availability individually, but combined impact is notable. The vulnerability can lead to unauthorized data disclosure, modification, or deletion, which is critical in a student management context where sensitive personal and academic data is stored. No patches or official fixes are currently linked, but public exploit code is available, increasing the urgency for mitigation. The vulnerability affects only version 1.0 of the product, which may limit the scope but still poses a significant risk to organizations using this version.
Potential Impact
For European organizations, particularly educational institutions and administrative bodies using the affected Student File Management System 1.0, this vulnerability could lead to unauthorized access to sensitive student data, including personal identification and academic records. The SQL injection could allow attackers to extract confidential information, alter or delete user records, or disrupt system availability by corrupting database contents. This compromises data confidentiality, integrity, and availability, potentially violating GDPR and other data protection regulations, leading to legal and reputational consequences. The remote and unauthenticated nature of the exploit increases the risk of widespread attacks, especially in environments with internet-facing administrative portals. The lack of known active exploitation currently provides a window for proactive defense, but the availability of public exploit code means attackers could rapidly weaponize this vulnerability. The impact extends beyond data loss to potential operational disruption in educational services, affecting students, staff, and administrative workflows.
Mitigation Recommendations
Organizations should immediately audit their use of the code-projects Student File Management System and identify any instances of version 1.0 in use. Since no official patch is currently available, implement the following mitigations: 1) Restrict access to the /admin/delete_user.php endpoint using network-level controls such as VPNs, IP whitelisting, or firewall rules to limit exposure to trusted administrators only. 2) Employ web application firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the user_id parameter. 3) Review and update the application code to use parameterized queries or prepared statements for all database interactions, especially those involving user-supplied input. 4) Implement rigorous input validation and sanitization on all parameters, particularly user_id, to reject malicious payloads. 5) Monitor logs for unusual database query patterns or repeated access attempts to the vulnerable endpoint. 6) Plan for an upgrade or replacement of the Student File Management System to a version without this vulnerability or an alternative product. 7) Conduct security awareness training for administrators to recognize and report suspicious activities. These steps will reduce the attack surface and mitigate the risk until an official patch is released.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-13T09:00:07.139Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 693e4f9cc223240c4b621aa1
Added to database: 12/14/2025, 5:48:12 AM
Last enriched: 12/14/2025, 6:03:10 AM
Last updated: 12/14/2025, 11:07:04 AM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14655: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-14654: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-14653: SQL Injection in itsourcecode Student Management System
MediumCVE-2025-14652: SQL Injection in itsourcecode Online Cake Ordering System
MediumCVE-2025-14651: Use of Hard-coded Cryptographic Key in MartialBE one-hub
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.