Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14900: SQL Injection in CodeAstro Real Estate Management System

0
Medium
VulnerabilityCVE-2025-14900cvecve-2025-14900
Published: Fri Dec 19 2025 (12/19/2025, 00:02:10 UTC)
Source: CVE Database V5
Vendor/Project: CodeAstro
Product: Real Estate Management System

Description

A security vulnerability has been detected in CodeAstro Real Estate Management System 1.0. Affected is an unknown function of the file /admin/userdelete.php of the component Administrator Endpoint. Such manipulation of the argument ID leads to sql injection. The attack may be launched remotely. The exploit has been disclosed publicly and may be used.

AI-Powered Analysis

AILast updated: 12/26/2025, 04:25:38 UTC

Technical Analysis

CVE-2025-14900 is a SQL injection vulnerability identified in version 1.0 of the CodeAstro Real Estate Management System, specifically within the /admin/userdelete.php script of the Administrator Endpoint. The vulnerability arises from improper sanitization of the 'ID' parameter, which is used in SQL queries to delete user records. An attacker with administrative privileges can remotely manipulate this parameter to inject malicious SQL code, potentially leading to unauthorized data access, modification, or deletion. The vulnerability does not require user interaction but does require the attacker to have high-level privileges (PR:H), limiting exploitation to insiders or compromised admin accounts. The CVSS 4.0 vector indicates network attack vector (AV:N), low complexity (AC:L), no authentication required (AT:N), and no user interaction (UI:N), but the privilege requirement reduces the overall risk. The impact on confidentiality, integrity, and availability is low to moderate, as the attacker can alter or extract data from the database. No patches or exploit code are currently publicly available, but the vulnerability disclosure increases the risk of future exploitation. The lack of scope change (SC:N) means the attack affects only the vulnerable component without impacting other system components.

Potential Impact

For European organizations, especially those in the real estate sector using CodeAstro Real Estate Management System 1.0, this vulnerability poses risks of unauthorized data access, data tampering, and potential disruption of administrative functions. Compromise could lead to leakage of sensitive client information, manipulation of user accounts, or deletion of critical data, impacting business operations and regulatory compliance, including GDPR. The requirement for administrative privileges reduces the likelihood of external attackers exploiting this vulnerability directly but raises concerns about insider threats or compromised admin credentials. The medium severity indicates a moderate risk level, but the potential damage to data integrity and confidentiality could have significant reputational and financial consequences. Organizations relying on this software should assess their exposure and implement compensating controls immediately.

Mitigation Recommendations

1. Apply vendor-provided patches or updates as soon as they become available to address the SQL injection vulnerability. 2. Restrict administrative access to the Real Estate Management System to trusted personnel only, using strong authentication mechanisms such as multi-factor authentication (MFA). 3. Implement strict input validation and parameterized queries or prepared statements in the application code to prevent SQL injection. 4. Conduct regular security audits and code reviews focusing on input handling in administrative endpoints. 5. Monitor database logs and application behavior for unusual queries or access patterns indicative of exploitation attempts. 6. Employ network segmentation and firewall rules to limit access to administrative interfaces from untrusted networks. 7. Educate administrators about phishing and credential security to reduce the risk of account compromise. 8. Consider deploying Web Application Firewalls (WAF) with SQL injection detection capabilities as an additional protective layer.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-18T16:31:16.846Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69449f434eb3efac36bb56b0

Added to database: 12/19/2025, 12:41:39 AM

Last enriched: 12/26/2025, 4:25:38 AM

Last updated: 2/6/2026, 1:59:15 PM

Views: 60

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats