CVE-2025-14951: SQL Injection in code-projects Scholars Tracking System
CVE-2025-14951 is a medium severity SQL injection vulnerability affecting version 1. 0 of the code-projects Scholars Tracking System. The flaw exists in an unknown function within the /home. php file, where manipulation of the post_content argument allows remote attackers to execute SQL injection without authentication or user interaction. Although no public exploits are currently observed in the wild, the vulnerability has been publicly disclosed, increasing the risk of exploitation. The vulnerability has a CVSS 4. 0 score of 6. 9, reflecting its network accessibility and ease of exploitation. Successful exploitation could lead to unauthorized data access or modification, impacting confidentiality, integrity, and availability of the system. European organizations using this software, especially educational institutions or research bodies, may be at risk.
AI Analysis
Technical Summary
CVE-2025-14951 identifies a SQL injection vulnerability in the Scholars Tracking System version 1.0 developed by code-projects. The vulnerability resides in an unspecified function within the /home.php file, where the post_content parameter is improperly sanitized, allowing attackers to inject malicious SQL commands. This injection flaw can be exploited remotely without requiring authentication or user interaction, making it highly accessible to attackers. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and partial impacts on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). The vulnerability does not involve scope changes or security requirements. Although no known exploits are currently active in the wild, the public disclosure increases the likelihood of exploitation attempts. The vulnerability could allow attackers to extract sensitive data, modify or delete records, or disrupt system operations by executing arbitrary SQL commands on the backend database. The lack of available patches necessitates immediate mitigation efforts by organizations using this software. Given the nature of the software—tracking scholars and potentially sensitive academic data—this vulnerability poses a significant risk to data confidentiality and system integrity.
Potential Impact
For European organizations, particularly educational institutions, research centers, and academic administrative bodies using the Scholars Tracking System 1.0, this vulnerability could lead to unauthorized access to sensitive personal and academic data. Exploitation could result in data breaches exposing student records, research data, or internal communications, damaging institutional reputation and violating data protection regulations such as GDPR. Integrity of academic records could be compromised, affecting decision-making and trustworthiness of the system. Availability impacts could disrupt administrative operations, delaying critical academic processes. The remote, unauthenticated nature of the exploit increases risk, especially for organizations with internet-facing deployments of the affected system. The medium severity rating suggests a significant but not critical risk, yet the absence of patches and public disclosure heighten urgency. European entities must consider the regulatory and reputational consequences of such breaches, especially under stringent data privacy laws.
Mitigation Recommendations
Organizations should immediately conduct a thorough code audit of the /home.php file focusing on the post_content parameter to identify and remediate the injection point. Implement parameterized queries or prepared statements to prevent direct SQL command injection. Employ rigorous input validation and sanitization techniques to reject malicious payloads. Restrict database user permissions to the minimum necessary to limit potential damage from exploitation. Monitor database logs and application behavior for unusual queries or access patterns indicative of exploitation attempts. If possible, isolate or restrict external access to the affected system until remediation is complete. Engage with the vendor or community to obtain patches or updates addressing this vulnerability. Additionally, implement web application firewalls (WAFs) with SQL injection detection rules as a temporary protective measure. Educate system administrators and security teams about this vulnerability and ensure incident response plans are updated to handle potential exploitation scenarios.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands
CVE-2025-14951: SQL Injection in code-projects Scholars Tracking System
Description
CVE-2025-14951 is a medium severity SQL injection vulnerability affecting version 1. 0 of the code-projects Scholars Tracking System. The flaw exists in an unknown function within the /home. php file, where manipulation of the post_content argument allows remote attackers to execute SQL injection without authentication or user interaction. Although no public exploits are currently observed in the wild, the vulnerability has been publicly disclosed, increasing the risk of exploitation. The vulnerability has a CVSS 4. 0 score of 6. 9, reflecting its network accessibility and ease of exploitation. Successful exploitation could lead to unauthorized data access or modification, impacting confidentiality, integrity, and availability of the system. European organizations using this software, especially educational institutions or research bodies, may be at risk.
AI-Powered Analysis
Technical Analysis
CVE-2025-14951 identifies a SQL injection vulnerability in the Scholars Tracking System version 1.0 developed by code-projects. The vulnerability resides in an unspecified function within the /home.php file, where the post_content parameter is improperly sanitized, allowing attackers to inject malicious SQL commands. This injection flaw can be exploited remotely without requiring authentication or user interaction, making it highly accessible to attackers. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and partial impacts on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). The vulnerability does not involve scope changes or security requirements. Although no known exploits are currently active in the wild, the public disclosure increases the likelihood of exploitation attempts. The vulnerability could allow attackers to extract sensitive data, modify or delete records, or disrupt system operations by executing arbitrary SQL commands on the backend database. The lack of available patches necessitates immediate mitigation efforts by organizations using this software. Given the nature of the software—tracking scholars and potentially sensitive academic data—this vulnerability poses a significant risk to data confidentiality and system integrity.
Potential Impact
For European organizations, particularly educational institutions, research centers, and academic administrative bodies using the Scholars Tracking System 1.0, this vulnerability could lead to unauthorized access to sensitive personal and academic data. Exploitation could result in data breaches exposing student records, research data, or internal communications, damaging institutional reputation and violating data protection regulations such as GDPR. Integrity of academic records could be compromised, affecting decision-making and trustworthiness of the system. Availability impacts could disrupt administrative operations, delaying critical academic processes. The remote, unauthenticated nature of the exploit increases risk, especially for organizations with internet-facing deployments of the affected system. The medium severity rating suggests a significant but not critical risk, yet the absence of patches and public disclosure heighten urgency. European entities must consider the regulatory and reputational consequences of such breaches, especially under stringent data privacy laws.
Mitigation Recommendations
Organizations should immediately conduct a thorough code audit of the /home.php file focusing on the post_content parameter to identify and remediate the injection point. Implement parameterized queries or prepared statements to prevent direct SQL command injection. Employ rigorous input validation and sanitization techniques to reject malicious payloads. Restrict database user permissions to the minimum necessary to limit potential damage from exploitation. Monitor database logs and application behavior for unusual queries or access patterns indicative of exploitation attempts. If possible, isolate or restrict external access to the affected system until remediation is complete. Engage with the vendor or community to obtain patches or updates addressing this vulnerability. Additionally, implement web application firewalls (WAFs) with SQL injection detection rules as a temporary protective measure. Educate system administrators and security teams about this vulnerability and ensure incident response plans are updated to handle potential exploitation scenarios.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-19T08:11:13.793Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 694563c4a90e3c9a153eb8f5
Added to database: 12/19/2025, 2:40:04 PM
Last enriched: 12/26/2025, 3:23:46 PM
Last updated: 2/6/2026, 4:55:10 PM
Views: 77
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13523: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Mattermost Mattermost Confluence Plugin
HighCVE-2026-2103: CWE-321 in Infor SyteLine ERP
HighCVE-2026-2058: SQL Injection in mathurvishal CloudClassroom-PHP-Project
MediumCVE-2026-25556: CWE-415 Double Free in Artifex Software MuPDF
MediumCVE-2026-2057: SQL Injection in SourceCodester Medical Center Portal Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.