CVE-2025-15011: SQL Injection in code-projects Simple Stock System
A vulnerability was found in code-projects Simple Stock System 1.0. Impacted is an unknown function of the file /logout.php. The manipulation of the argument uname results in sql injection. The attack can be executed remotely. The exploit has been made public and could be used.
AI Analysis
Technical Summary
CVE-2025-15011 identifies a SQL injection vulnerability in the Simple Stock System version 1.0 developed by code-projects. The vulnerability resides in the /logout.php script, where the uname parameter is improperly sanitized, allowing an attacker to inject malicious SQL code. This injection flaw can be exploited remotely without requiring authentication or user interaction, making it highly accessible to attackers. The vulnerability can lead to unauthorized disclosure, modification, or deletion of database records, compromising the confidentiality, integrity, and availability of the system's data. The CVSS 4.0 base score is 6.9, indicating a medium severity level, with the vector highlighting network attack vector, low attack complexity, no privileges or user interaction needed, and limited impact on confidentiality, integrity, and availability. Although no known exploits are currently active in the wild, the public availability of exploit code increases the risk of future attacks. The affected product is primarily used for stock and inventory management, which may contain sensitive business data. The lack of patches or vendor advisories necessitates immediate mitigation efforts by users. This vulnerability underscores the importance of secure coding practices, especially input validation and the use of parameterized queries to prevent SQL injection.
Potential Impact
For European organizations, exploitation of this vulnerability could lead to unauthorized access to sensitive inventory and business data, potentially exposing trade secrets, customer information, or financial records. Data integrity could be compromised by unauthorized modification or deletion of records, disrupting business operations and supply chain management. Availability may also be affected if attackers leverage the vulnerability to cause database errors or crashes. Small and medium enterprises (SMEs) relying on Simple Stock System for inventory management are particularly at risk, as they may lack robust cybersecurity defenses. The breach of such systems could lead to regulatory non-compliance under GDPR if personal data is exposed, resulting in legal and financial penalties. Additionally, disruption in stock management could impact production and delivery schedules, affecting customer satisfaction and revenue. The medium severity rating suggests that while the vulnerability is serious, it may not lead to full system compromise without additional attack vectors. However, the ease of remote exploitation without authentication heightens the threat level. Organizations in manufacturing, retail, and logistics sectors across Europe are especially vulnerable due to their reliance on inventory systems.
Mitigation Recommendations
Organizations using Simple Stock System 1.0 should immediately conduct a thorough code review of the /logout.php script, focusing on the uname parameter to identify and remediate the SQL injection flaw. Implement parameterized queries or prepared statements to safely handle user inputs and prevent injection. Apply rigorous input validation and sanitization on all user-supplied data, especially parameters involved in database queries. If vendor patches become available, prioritize their deployment. In the absence of official patches, consider isolating the affected system from external networks or restricting access to trusted IP addresses to reduce exposure. Employ web application firewalls (WAFs) configured to detect and block SQL injection attempts targeting the uname parameter. Regularly monitor logs for suspicious activities related to logout.php and unusual database queries. Conduct security awareness training for developers to reinforce secure coding practices. Finally, maintain up-to-date backups of critical data to enable recovery in case of compromise.
Affected Countries
Germany, France, Italy, United Kingdom, Spain, Netherlands
CVE-2025-15011: SQL Injection in code-projects Simple Stock System
Description
A vulnerability was found in code-projects Simple Stock System 1.0. Impacted is an unknown function of the file /logout.php. The manipulation of the argument uname results in sql injection. The attack can be executed remotely. The exploit has been made public and could be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-15011 identifies a SQL injection vulnerability in the Simple Stock System version 1.0 developed by code-projects. The vulnerability resides in the /logout.php script, where the uname parameter is improperly sanitized, allowing an attacker to inject malicious SQL code. This injection flaw can be exploited remotely without requiring authentication or user interaction, making it highly accessible to attackers. The vulnerability can lead to unauthorized disclosure, modification, or deletion of database records, compromising the confidentiality, integrity, and availability of the system's data. The CVSS 4.0 base score is 6.9, indicating a medium severity level, with the vector highlighting network attack vector, low attack complexity, no privileges or user interaction needed, and limited impact on confidentiality, integrity, and availability. Although no known exploits are currently active in the wild, the public availability of exploit code increases the risk of future attacks. The affected product is primarily used for stock and inventory management, which may contain sensitive business data. The lack of patches or vendor advisories necessitates immediate mitigation efforts by users. This vulnerability underscores the importance of secure coding practices, especially input validation and the use of parameterized queries to prevent SQL injection.
Potential Impact
For European organizations, exploitation of this vulnerability could lead to unauthorized access to sensitive inventory and business data, potentially exposing trade secrets, customer information, or financial records. Data integrity could be compromised by unauthorized modification or deletion of records, disrupting business operations and supply chain management. Availability may also be affected if attackers leverage the vulnerability to cause database errors or crashes. Small and medium enterprises (SMEs) relying on Simple Stock System for inventory management are particularly at risk, as they may lack robust cybersecurity defenses. The breach of such systems could lead to regulatory non-compliance under GDPR if personal data is exposed, resulting in legal and financial penalties. Additionally, disruption in stock management could impact production and delivery schedules, affecting customer satisfaction and revenue. The medium severity rating suggests that while the vulnerability is serious, it may not lead to full system compromise without additional attack vectors. However, the ease of remote exploitation without authentication heightens the threat level. Organizations in manufacturing, retail, and logistics sectors across Europe are especially vulnerable due to their reliance on inventory systems.
Mitigation Recommendations
Organizations using Simple Stock System 1.0 should immediately conduct a thorough code review of the /logout.php script, focusing on the uname parameter to identify and remediate the SQL injection flaw. Implement parameterized queries or prepared statements to safely handle user inputs and prevent injection. Apply rigorous input validation and sanitization on all user-supplied data, especially parameters involved in database queries. If vendor patches become available, prioritize their deployment. In the absence of official patches, consider isolating the affected system from external networks or restricting access to trusted IP addresses to reduce exposure. Employ web application firewalls (WAFs) configured to detect and block SQL injection attempts targeting the uname parameter. Regularly monitor logs for suspicious activities related to logout.php and unusual database queries. Conduct security awareness training for developers to reinforce secure coding practices. Finally, maintain up-to-date backups of critical data to enable recovery in case of compromise.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-21T16:28:44.988Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6948c1179b5fbca4f51854f0
Added to database: 12/22/2025, 3:55:03 AM
Last enriched: 12/22/2025, 4:01:14 AM
Last updated: 12/22/2025, 6:04:36 AM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11545: CWE-497: Exposure of Sensitive System Information to an Unauthorized Control Sphere in Sharp Display Solutions, Ltd. NP-PA1705UL-W, NP-PA1705UL-W+, NP-PA1705UL-B, NP-PA1705UL-B+, NP-PA1505UL-W, NP-PA1505UL-W+, NP-PA1505UL-B, NP-PA1505UL-B+, NP-PA1505UL-BJL NP-PV800UL-W, NP-PV800UL-W+, NP-PV800UL-B, NP-PV800UL-B+, NP-PV710UL-W, NP-PV710UL-W+, NP-PV710UL-B, NP-PV710UL-B+, NP-PV800UL-W1, NP-PV800UL-B1, NP-PV710UL-W1, NP-PV710UL-B1, NP-PV800UL-B1G, NP-PV710UL-B1G, NP-PV800UL-WH, NP-PV710UL-WH, NP-P627UL, NP-P627ULG, NP-P627UL+, NP-P547UL, NP-P547ULG, NP-P607UL+, NP-CG6600UL, NP-H6271UL, NP-H5471UL, NP-P627ULH, NP-P547ULH NP-PV710UL+ NP-PA1004UL-W, NP-PA1004UL-WG, NP-PA1004UL-W+, NP-PA1004UL-WH, NP-PA1004UL-B, NP-PA1004UL-BG, NP-PA1004UL-B+, NP-PA804UL-W, NP-PA804UL-WG, NP-PA804UL-W+, NP-PA804UL-WH, NP-PA804UL-B, NP-PA804UL-BG, NP-PA804UL-B+, NP-PA1004UL-BH, NP-PA804UL-BH, NP-PE455UL, NP-PE455ULG, NP-PE455WL, NP-PE455WLG, NP-PE505XLG, NP-CG6500XL, NP-CG6400UL, NP-CG6400WL, NP-CB4500XL, NP-CA4120X, NP-CA4160W, NP-CA4160X, NP-CA4200U, NP-CA4200W, NP-CA4202W, NP-CA4260X, NP-CA4300X, NP-CA4355X, NP-CD2100U, NP-CD2120X, NP-CD2300X, NP-CR2100X, NP-CR2170W, NP-CR2170X, NP-CR2200U, NP-CR2200W, NP-CR2280X, NP-CR2310X, NP-CR2350X, NP-MC302XG, NP-MC332WG, NP-MC342XG, NP-MC372X, NP-MC372XG, NP-MC382W, NP-MC382WG, NP-MC422XG, NP-ME342UG, NP-ME372W, NP-ME372WG, NP-ME382U, NP-ME382UG, NP-ME402X, NP-ME402XG NP-CU4300XD, NP-CU4200XD, NP-CU4200WD, NP-UM383WL, NP-UM383WLG, NP-CJ2200WD, NP-PH3501QL, NP-PH3501QL+, NP-PH2601QL, NP-PH2601QL+, NP-PH350Q40L, NP-PH260Q30L, NP-PX1005QL-W, NP-PX1005QL-B, NP-PX1005QL-B+, NP-P525UL, NP-P525ULG, NP-P525UL+, NP-P525WL, NP-P525WLG, NP-P525WL+, NP-P605UL, NP-P605ULG, NP-P605UL+
CriticalCVE-2025-11544: CWE-912: Hidden Functionality in Sharp Display Solutions, Ltd. NP-P627UL, NP-P627ULG, NP-P627UL+, NP-P547UL, NP-P547ULG, NP-P607UL+, NP-CG6600UL, NP-H6271UL, NP-H5471UL, NP-P627ULH, NP-P547ULH, NP-PE455UL, NP-PE455ULG, NP-PE455WL, NP-PE455WLG, NP-PE505XLG, NP-CG6500XL, NP-CG6400UL, NP-CG6400WL, NP-CB4500XL, NP-CA4120X, NP-CA4160W, NP-CA4160X, NP-CA4200U, NP-CA4200W, NP-CA4202W, NP-CA4260X, NP-CA4300X, NP-CA4355X, NP-CD2100U, NP-CD2120X, NP-CD2300X, NP-CR2100X, NP-CR2170W, NP-CR2170X, NP-CR2200U, NP-CR2200W, NP-CR2280X, NP-CR2310X, NP-CR2350X, NP-MC302XG, NP-MC332WG, NP-MC342XG, NP-MC372X, NP-MC372XG, NP-MC382W, NP-MC382WG, NP-MC422XG, NP-ME342UG, NP-ME372W, NP-ME372WG, NP-ME382U, NP-ME382UG, NP-ME402X, NP-ME402XG, NP-P525UL, NP-P525ULG, NP-P525UL+, NP-P525WL, NP-P525WLG, NP-P525WL+, NP-P605UL, NP-P605ULG, NP-P605UL+, NP-CG6500UL, NP-CG6500WL, NP-CB4500UL, NP-CB4500WL, NP-P525ULH, NP-P525WLH, NP-P605ULH, NP-P554U, NP-P554UG, NP-P554U+, NP-P554W, NP-P554WG, NP-P554W+, NP-P474U, NP-P474UG, NP-P474W, NP-P474WG, NP-P604XG, NP-P604X+, NP-P603XG, NP-P523X+, NP-PE523XG, NP-PE523X+, NP-CF6600U, NP-CF6600W, NP-CF6700X, NP-CF6500X, NP-CB4600U, NP-P554UH, NP-P554WH, NP-P474UH, NP-P474WH, NP-P604XH, NP-P603XH, NP-PE523XH, NP-P502HL-2, NP-P502WL-2, NP-P502HLG-2, NP-P502WLG ,NP-ME401W, NP-ME361W, NP-ME331W, NP-ME301W, NP-ME401X, NP-ME361X, NP-ME331X, NP-ME301X, NP-ME401WG, NP-ME361WG, NP-ME331WG, NP-ME301WG, NP-ME401XG, NP-ME361XG, NP-ME331XG, NP-ME301XG, NP-CA4155W, NP-CA4350X, NP-CA4255X, NP-CA4155X, NP-CA4115X, NP-MC331WG, NP-MC421XG, NP-MC401XG, NP-MC371XG, NP-MC331XG, NP-MC301XG, NP-CK4155W, NP-CK4255X, NP-CK4155X, NP-CK4055X, NP-CM4150X, NP-CM4050X, NP-CK4155WG, NP-CK4255XG, NP-CK4155XG, NP-CR2165W, NP-CR2305X, NP-CR2275X, NP-CR2165X, NP-CR2155X, NP-CD2115X, NP-CD2105X, NP-CM4151X, NP-CR2276X, NP-CD2116X, NP-P502H, NP-P502W, NP-P452H, NP-P452W
CriticalCVE-2025-15012: SQL Injection in code-projects Refugee Food Management System
MediumCVE-2025-15013: Stack-based Buffer Overflow in floooh sokol
MediumCVE-2025-15016: CWE-321 Use of Hard-coded Cryptographic Key in Ragic Enterprise Cloud Database
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.