CVE-2025-14647: SQL Injection in code-projects Computer Book Store
A weakness has been identified in code-projects Computer Book Store 1.0. Affected is an unknown function of the file /admin_delete.php. This manipulation of the argument bookisbn causes sql injection. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited.
AI Analysis
Technical Summary
CVE-2025-14647 identifies a SQL injection vulnerability in code-projects Computer Book Store version 1.0, specifically within the /admin_delete.php script. The vulnerability arises from improper sanitization of the 'bookisbn' parameter, which is used in SQL queries without adequate validation or parameterization. This allows an unauthenticated remote attacker to inject arbitrary SQL commands, potentially manipulating the backend database. The attack vector requires no user interaction and no privileges, making exploitation straightforward. The CVSS 4.0 base score is 6.9 (medium), reflecting the moderate impact on confidentiality, integrity, and availability, with limited scope and no scope change. The vulnerability could allow attackers to read, modify, or delete data, or disrupt service availability. Although no exploits have been observed in the wild, the availability of proof-of-concept code increases the risk of exploitation. The affected product is niche software used for managing online book sales, which may be deployed by small to medium enterprises. The lack of official patches necessitates immediate mitigation efforts by users. The vulnerability highlights the critical need for secure coding practices, especially input validation and the use of prepared statements or parameterized queries to prevent SQL injection attacks.
Potential Impact
For European organizations using code-projects Computer Book Store 1.0, this vulnerability poses a risk of unauthorized data access, data manipulation, and potential service disruption. Confidentiality could be compromised if attackers extract sensitive customer or transactional data. Integrity risks include unauthorized modification or deletion of records, which could affect inventory, sales data, or financial records. Availability may be impacted if attackers exploit the vulnerability to cause database errors or denial of service. Given the remote and unauthenticated nature of the exploit, attackers can easily target vulnerable systems over the internet. This could lead to reputational damage, regulatory penalties under GDPR if personal data is exposed, and financial losses. The medium severity rating suggests that while the impact is significant, it may not lead to full system compromise or widespread disruption unless combined with other vulnerabilities. However, the presence of publicly available exploit code increases the urgency for mitigation to prevent opportunistic attacks.
Mitigation Recommendations
1. Immediately audit and review the /admin_delete.php script, focusing on the 'bookisbn' parameter handling. 2. Implement strict input validation to ensure only valid ISBN formats are accepted. 3. Refactor database queries to use prepared statements or parameterized queries to eliminate direct concatenation of user input into SQL commands. 4. Apply web application firewalls (WAF) with rules to detect and block SQL injection attempts targeting this parameter. 5. Monitor logs for suspicious activity related to /admin_delete.php and the bookisbn parameter. 6. If possible, upgrade to a patched version once available or apply vendor-provided patches promptly. 7. Conduct security training for developers on secure coding practices to prevent similar vulnerabilities. 8. Consider isolating the affected application in a segmented network zone to limit potential damage. 9. Regularly back up databases and test restoration procedures to mitigate impact of data loss or corruption. 10. Engage in vulnerability scanning and penetration testing to identify and remediate similar injection flaws.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
CVE-2025-14647: SQL Injection in code-projects Computer Book Store
Description
A weakness has been identified in code-projects Computer Book Store 1.0. Affected is an unknown function of the file /admin_delete.php. This manipulation of the argument bookisbn causes sql injection. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited.
AI-Powered Analysis
Technical Analysis
CVE-2025-14647 identifies a SQL injection vulnerability in code-projects Computer Book Store version 1.0, specifically within the /admin_delete.php script. The vulnerability arises from improper sanitization of the 'bookisbn' parameter, which is used in SQL queries without adequate validation or parameterization. This allows an unauthenticated remote attacker to inject arbitrary SQL commands, potentially manipulating the backend database. The attack vector requires no user interaction and no privileges, making exploitation straightforward. The CVSS 4.0 base score is 6.9 (medium), reflecting the moderate impact on confidentiality, integrity, and availability, with limited scope and no scope change. The vulnerability could allow attackers to read, modify, or delete data, or disrupt service availability. Although no exploits have been observed in the wild, the availability of proof-of-concept code increases the risk of exploitation. The affected product is niche software used for managing online book sales, which may be deployed by small to medium enterprises. The lack of official patches necessitates immediate mitigation efforts by users. The vulnerability highlights the critical need for secure coding practices, especially input validation and the use of prepared statements or parameterized queries to prevent SQL injection attacks.
Potential Impact
For European organizations using code-projects Computer Book Store 1.0, this vulnerability poses a risk of unauthorized data access, data manipulation, and potential service disruption. Confidentiality could be compromised if attackers extract sensitive customer or transactional data. Integrity risks include unauthorized modification or deletion of records, which could affect inventory, sales data, or financial records. Availability may be impacted if attackers exploit the vulnerability to cause database errors or denial of service. Given the remote and unauthenticated nature of the exploit, attackers can easily target vulnerable systems over the internet. This could lead to reputational damage, regulatory penalties under GDPR if personal data is exposed, and financial losses. The medium severity rating suggests that while the impact is significant, it may not lead to full system compromise or widespread disruption unless combined with other vulnerabilities. However, the presence of publicly available exploit code increases the urgency for mitigation to prevent opportunistic attacks.
Mitigation Recommendations
1. Immediately audit and review the /admin_delete.php script, focusing on the 'bookisbn' parameter handling. 2. Implement strict input validation to ensure only valid ISBN formats are accepted. 3. Refactor database queries to use prepared statements or parameterized queries to eliminate direct concatenation of user input into SQL commands. 4. Apply web application firewalls (WAF) with rules to detect and block SQL injection attempts targeting this parameter. 5. Monitor logs for suspicious activity related to /admin_delete.php and the bookisbn parameter. 6. If possible, upgrade to a patched version once available or apply vendor-provided patches promptly. 7. Conduct security training for developers on secure coding practices to prevent similar vulnerabilities. 8. Consider isolating the affected application in a segmented network zone to limit potential damage. 9. Regularly back up databases and test restoration procedures to mitigate impact of data loss or corruption. 10. Engage in vulnerability scanning and penetration testing to identify and remediate similar injection flaws.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-13T09:03:31.685Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 693e5e61b7454206b45b08df
Added to database: 12/14/2025, 6:51:13 AM
Last enriched: 12/14/2025, 7:06:04 AM
Last updated: 12/14/2025, 2:40:05 PM
Views: 13
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14663: Cross Site Scripting in code-projects Student File Management System
MediumCVE-2025-14662: Cross Site Scripting in code-projects Student File Management System
MediumCVE-2025-14660: Improper Access Controls in DecoCMS Mesh
MediumCVE-2025-14661: SQL Injection in itsourcecode Student Managemen System
MediumCVE-2025-14659: Command Injection in D-Link DIR-860LB1
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.