Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15011: SQL Injection in code-projects Simple Stock System

0
Medium
VulnerabilityCVE-2025-15011cvecve-2025-15011
Published: Mon Dec 22 2025 (12/22/2025, 03:32:06 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Simple Stock System

Description

A vulnerability was found in code-projects Simple Stock System 1.0. Impacted is an unknown function of the file /logout.php. The manipulation of the argument uname results in sql injection. The attack can be executed remotely. The exploit has been made public and could be used.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 23:12:46 UTC

Technical Analysis

CVE-2025-15011 identifies a SQL injection vulnerability in the Simple Stock System version 1.0 developed by code-projects. The vulnerability resides in the /logout.php script, specifically in the handling of the uname parameter. Due to insufficient input validation or sanitization, attackers can inject crafted SQL statements remotely without authentication or user interaction. This injection can manipulate backend SQL queries, potentially allowing attackers to read, modify, or delete database records, thereby compromising data confidentiality, integrity, and availability. The CVSS 4.0 base score is 6.9 (medium), reflecting network attack vector, low complexity, no privileges or user interaction required, and partial impact on confidentiality, integrity, and availability. Although no exploits have been observed in the wild, the public disclosure of exploit code increases the likelihood of exploitation attempts. The vulnerability affects only version 1.0 of the product, and no official patches or updates have been published at the time of disclosure. The lack of patch availability necessitates immediate mitigation through secure coding practices, input validation, and database access restrictions. This vulnerability highlights the importance of sanitizing all user inputs, especially in web applications handling critical business functions such as stock management.

Potential Impact

The SQL injection vulnerability allows remote attackers to execute arbitrary SQL commands on the backend database without authentication, potentially leading to unauthorized data access, data corruption, or deletion. This can result in leakage of sensitive business information, manipulation of stock records, or denial of service if critical database tables are altered or dropped. For organizations relying on the Simple Stock System for inventory management, this could disrupt operations, cause financial losses, and damage reputation. The medium severity rating reflects that while the impact is significant, it is not fully critical since the scope of impact is limited to the database and requires exploitation of a specific parameter. However, the ease of remote exploitation without credentials increases the risk profile. Organizations with inadequate network segmentation or monitoring may be more vulnerable to automated or targeted attacks leveraging this flaw. The absence of known exploits in the wild currently limits immediate widespread impact, but the public availability of exploit code could lead to rapid exploitation in the near term.

Mitigation Recommendations

Since no official patches are currently available, organizations should implement immediate mitigations including: 1) Applying strict input validation and sanitization on the uname parameter in /logout.php to neutralize SQL metacharacters and prevent injection. 2) Employing parameterized queries or prepared statements in the application code to separate SQL logic from user input. 3) Restricting database user permissions to the minimum necessary, preventing the application from performing destructive operations. 4) Monitoring web application logs and database logs for suspicious queries or unusual activity related to the uname parameter. 5) Implementing web application firewalls (WAF) with rules to detect and block SQL injection attempts targeting this endpoint. 6) Considering network segmentation to limit exposure of the vulnerable system to untrusted networks. 7) Planning and testing an upgrade or patch deployment once the vendor releases an official fix. 8) Educating development teams on secure coding practices to prevent similar vulnerabilities in future releases.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-21T16:28:44.988Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6948c1179b5fbca4f51854f0

Added to database: 12/22/2025, 3:55:03 AM

Last enriched: 2/24/2026, 11:12:46 PM

Last updated: 3/25/2026, 9:21:39 AM

Views: 108

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses