Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15012: SQL Injection in code-projects Refugee Food Management System

0
Medium
VulnerabilityCVE-2025-15012cvecve-2025-15012
Published: Mon Dec 22 2025 (12/22/2025, 04:02:06 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Refugee Food Management System

Description

A vulnerability was determined in code-projects Refugee Food Management System 1.0. The affected element is an unknown function of the file /home/home.php. This manipulation of the argument a causes sql injection. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized.

AI-Powered Analysis

AILast updated: 12/22/2025, 05:13:42 UTC

Technical Analysis

CVE-2025-15012 identifies a SQL injection vulnerability in the Refugee Food Management System version 1.0 developed by code-projects. The vulnerability exists in an unspecified function within the /home/home.php file, where the argument 'a' is improperly sanitized, allowing remote attackers to inject malicious SQL code. This injection can lead to unauthorized data access, modification, or deletion within the underlying database. The attack vector is network-based with no required privileges or user interaction, making exploitation straightforward once the system is accessible. The vulnerability affects confidentiality by potentially exposing sensitive data, integrity by allowing unauthorized data manipulation, and availability by enabling destructive queries. Although no known exploits are currently active in the wild, the public disclosure of exploit details increases the risk of exploitation by threat actors. The CVSS 4.0 vector indicates low complexity, no authentication, and no user interaction, with partial impact on confidentiality, integrity, and availability. The Refugee Food Management System is likely used by organizations managing food distribution for displaced populations, making the data and service critical. The lack of available patches necessitates immediate mitigation through input validation and other protective measures.

Potential Impact

For European organizations, especially NGOs, government agencies, and humanitarian groups managing refugee food distribution, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to sensitive personal data of refugees, disruption of food supply logistics, and potential manipulation of resource allocation data. This could undermine trust, cause operational delays, and expose organizations to regulatory penalties under GDPR due to data breaches. The impact extends to service availability, potentially interrupting critical aid delivery. Given the public disclosure and ease of exploitation, attackers could leverage this vulnerability to cause reputational damage or gain footholds for further network intrusion. Organizations relying on this system without timely mitigation are at heightened risk of targeted attacks, especially in countries with large refugee populations or active humanitarian operations.

Mitigation Recommendations

Organizations should immediately conduct a thorough code audit focusing on the /home/home.php file to identify and sanitize all inputs, especially the argument 'a'. Employ parameterized queries or prepared statements to prevent SQL injection. Deploy Web Application Firewalls (WAFs) configured to detect and block SQL injection patterns targeting this system. Monitor database logs and application behavior for anomalous queries or access patterns. Restrict network access to the management system to trusted IPs and implement network segmentation to limit exposure. Regularly update and patch the system once official fixes become available. Conduct security awareness training for developers and administrators on secure coding practices. Additionally, implement comprehensive backup and recovery procedures to mitigate potential data loss or corruption from exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-21T16:31:08.108Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6948d0ddf3d40542c74aa48c

Added to database: 12/22/2025, 5:02:21 AM

Last enriched: 12/22/2025, 5:13:42 AM

Last updated: 12/22/2025, 7:24:28 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Related Threats

CVE-2025-15014: SQL Injection in loganhong php loganSite

Medium
VulnerabilityMon Dec 22 2025

CVE-2025-12049: CWE-306: Missing Authentication for Critical Function in Sharp Display Solutions, Ltd. Media Player MP-01

Critical
VulnerabilityMon Dec 22 2025

CVE-2025-11543: CWE-354: Improper Validation of Integrity Check Value in Sharp Display Solutions, Ltd. NP-P502HL-2, NP-P502WL-2, NP-P502HLG-2, NP-P502WLG, NP-P502H, NP-P502W, NP-P452H, NP-P452W, NP-P502HG, NP-P502WG, NP-P452HG, NP-P452WG, NP-P502H+, NP-P502W+, NP-CR5450H, NP-CR5450W, NP-P502HL, NP-P502WL, NP-P502HLG, NP-P502WLG, NP-P502HL+, NP-P502WL+, NP-CR5450HL, NP-CR5450WL, NP-UM352W, NP-UM352WG, NP-UM352W+

Critical
VulnerabilityMon Dec 22 2025

CVE-2025-11542: CWE-121: Stack-based Buffer Overflow in Sharp Display Solutions, Ltd. NP-P502HL-2, NP-P502WL-2, NP-P502HLG-2, NP-P502WLG, NP-P502H, NP-P502W, NP-P452H, NP-P452W, NP-P502HG, NP-P502WG, NP-P452HG, NP-P452WG, NP-P502H+, NP-P502W+, NP-CR5450H, NP-CR5450W, NP-P502HL, NP-P502WL, NP-P502HLG, NP-P502WLG, NP-P502HL+, NP-P502WL+, NP-CR5450HL, NP-CR5450WL, NP-UM352W, NP-UM352WG, NP-UM352W+

High
VulnerabilityMon Dec 22 2025

CVE-2025-11541: CWE-121: Stack-based Buffer Overflow in Sharp Display Solutions, Ltd. NP-P502HL-2, NP-P502WL-2, NP-P502HLG-2, NP-P502WLG, NP-P502H, NP-P502W, NP-P452H, NP-P452W, NP-P502HG, NP-P502WG, NP-P452HG, NP-P452WG, NP-P502H+, NP-P502W+, NP-CR5450H, NP-CR5450W, NP-P502HL, NP-P502WL, NP-P502HLG, NP-P502WLG, NP-P502HL+, NP-P502WL+, NP-CR5450HL, NP-CR5450WL, NP-UM352W, NP-UM352WG, NP-UM352W+

Critical
VulnerabilityMon Dec 22 2025

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats