CVE-2025-14950: SQL Injection in code-projects Scholars Tracking System
A weakness has been identified in code-projects Scholars Tracking System 1.0. The affected element is an unknown function of the file /delete_post.php. This manipulation of the argument ID causes sql injection. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be exploited.
AI Analysis
Technical Summary
CVE-2025-14950 identifies a SQL Injection vulnerability in the Scholars Tracking System version 1.0 developed by code-projects. The vulnerability resides in the /delete_post.php file, where the ID parameter is improperly sanitized, allowing an attacker to inject malicious SQL statements. This injection flaw can be exploited remotely without authentication or user interaction, enabling attackers to manipulate backend database queries. Potential consequences include unauthorized data access, data modification, deletion, or even complete compromise of the database. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the vulnerability's network attack vector, low complexity, and no required privileges or user interaction. Although no active exploitation has been reported, a public exploit exists, increasing the likelihood of attacks. The vulnerability affects only version 1.0 of the software, which is primarily used by educational institutions to track scholar data, making sensitive student and academic information vulnerable. The lack of available patches necessitates immediate mitigation efforts by users. This vulnerability highlights the critical need for secure coding practices, particularly input validation and use of parameterized queries to prevent SQL Injection attacks.
Potential Impact
For European organizations, particularly educational institutions using the Scholars Tracking System, this vulnerability poses significant risks. Exploitation could lead to unauthorized disclosure of sensitive student and academic data, violating data protection regulations such as GDPR. Data integrity could be compromised, affecting the accuracy of academic records and potentially disrupting administrative operations. Availability of the system could also be impacted if attackers execute destructive SQL commands, leading to downtime and operational delays. The public availability of an exploit increases the risk of opportunistic attacks, including from cybercriminals targeting educational data for identity theft or ransomware campaigns. The medium severity rating suggests moderate but tangible risks, especially given the lack of authentication requirements and remote exploitability. European organizations must consider the reputational damage and legal consequences of data breaches stemming from this vulnerability.
Mitigation Recommendations
Immediate mitigation should focus on code remediation by developers: sanitize and validate all inputs, especially the ID parameter in /delete_post.php, using parameterized queries or prepared statements to prevent SQL Injection. If source code access is unavailable, organizations should implement web application firewalls (WAFs) with rules to detect and block SQL Injection attempts targeting this endpoint. Restrict database user permissions to the minimum necessary to limit the impact of any injection. Conduct thorough security audits of the entire application to identify and remediate similar vulnerabilities. Monitor logs for suspicious activity related to the /delete_post.php endpoint. Educate staff on the risks and ensure timely updates when patches become available. Consider isolating the application environment and backing up data regularly to enable recovery in case of compromise. Engage with the vendor or community for official patches or updates. Finally, review and enforce compliance with GDPR and other relevant data protection frameworks to mitigate legal risks.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-14950: SQL Injection in code-projects Scholars Tracking System
Description
A weakness has been identified in code-projects Scholars Tracking System 1.0. The affected element is an unknown function of the file /delete_post.php. This manipulation of the argument ID causes sql injection. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be exploited.
AI-Powered Analysis
Technical Analysis
CVE-2025-14950 identifies a SQL Injection vulnerability in the Scholars Tracking System version 1.0 developed by code-projects. The vulnerability resides in the /delete_post.php file, where the ID parameter is improperly sanitized, allowing an attacker to inject malicious SQL statements. This injection flaw can be exploited remotely without authentication or user interaction, enabling attackers to manipulate backend database queries. Potential consequences include unauthorized data access, data modification, deletion, or even complete compromise of the database. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the vulnerability's network attack vector, low complexity, and no required privileges or user interaction. Although no active exploitation has been reported, a public exploit exists, increasing the likelihood of attacks. The vulnerability affects only version 1.0 of the software, which is primarily used by educational institutions to track scholar data, making sensitive student and academic information vulnerable. The lack of available patches necessitates immediate mitigation efforts by users. This vulnerability highlights the critical need for secure coding practices, particularly input validation and use of parameterized queries to prevent SQL Injection attacks.
Potential Impact
For European organizations, particularly educational institutions using the Scholars Tracking System, this vulnerability poses significant risks. Exploitation could lead to unauthorized disclosure of sensitive student and academic data, violating data protection regulations such as GDPR. Data integrity could be compromised, affecting the accuracy of academic records and potentially disrupting administrative operations. Availability of the system could also be impacted if attackers execute destructive SQL commands, leading to downtime and operational delays. The public availability of an exploit increases the risk of opportunistic attacks, including from cybercriminals targeting educational data for identity theft or ransomware campaigns. The medium severity rating suggests moderate but tangible risks, especially given the lack of authentication requirements and remote exploitability. European organizations must consider the reputational damage and legal consequences of data breaches stemming from this vulnerability.
Mitigation Recommendations
Immediate mitigation should focus on code remediation by developers: sanitize and validate all inputs, especially the ID parameter in /delete_post.php, using parameterized queries or prepared statements to prevent SQL Injection. If source code access is unavailable, organizations should implement web application firewalls (WAFs) with rules to detect and block SQL Injection attempts targeting this endpoint. Restrict database user permissions to the minimum necessary to limit the impact of any injection. Conduct thorough security audits of the entire application to identify and remediate similar vulnerabilities. Monitor logs for suspicious activity related to the /delete_post.php endpoint. Educate staff on the risks and ensure timely updates when patches become available. Consider isolating the application environment and backing up data regularly to enable recovery in case of compromise. Engage with the vendor or community for official patches or updates. Finally, review and enforce compliance with GDPR and other relevant data protection frameworks to mitigate legal risks.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-19T08:11:00.614Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69455922a90e3c9a153a0e42
Added to database: 12/19/2025, 1:54:42 PM
Last enriched: 12/26/2025, 2:11:20 PM
Last updated: 2/7/2026, 9:12:05 AM
Views: 78
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumCVE-2026-1643: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ariagle MP-Ukagaka
MediumCVE-2026-1634: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in alexdtn Subitem AL Slider
MediumCVE-2026-1613: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in mrlister1 Wonka Slide
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.