CVE-2025-15049: SQL Injection in code-projects Online Farm System
A vulnerability was identified in code-projects Online Farm System 1.0. Affected is an unknown function of the file /addProduct.php. The manipulation of the argument Username leads to sql injection. The attack may be initiated remotely. The exploit is publicly available and might be used.
AI Analysis
Technical Summary
CVE-2025-15049 identifies a SQL injection vulnerability in the Online Farm System version 1.0 developed by code-projects. The flaw exists in the /addProduct.php script where the 'Username' parameter is not properly sanitized or validated before being incorporated into SQL queries. This allows an unauthenticated remote attacker to inject arbitrary SQL code, potentially manipulating the backend database. The vulnerability does not require privileges or user interaction, making it easier to exploit remotely. The impact includes unauthorized data disclosure, modification, or deletion, which can compromise the confidentiality, integrity, and availability of the system's data. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no authentication required (AT:N), no user interaction (UI:N), and low to medium impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although no active exploits are reported, a public exploit exists, increasing the risk of exploitation. The vulnerability affects only version 1.0 of the product, which is likely an early release. No official patches have been linked yet, so mitigation relies on secure coding practices and configuration changes. This vulnerability is particularly critical for organizations relying on this software for farm management, as it could lead to operational disruption or data breaches.
Potential Impact
For European organizations, especially those in the agriculture sector using the Online Farm System 1.0, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to sensitive farm management data, including product inventories, user credentials, and operational details. This could result in data breaches, loss of intellectual property, or manipulation of farm product records, potentially disrupting supply chains. The integrity of data could be compromised, leading to incorrect product information or fraudulent transactions. Availability could also be affected if attackers execute destructive SQL commands. Given the remote and unauthenticated nature of the exploit, attackers could target multiple organizations en masse. This risk is heightened in countries with advanced agricultural technology adoption and digital farm management systems. The lack of patches means organizations must act quickly to implement mitigations to avoid operational and reputational damage.
Mitigation Recommendations
1. Immediate code review and remediation of the /addProduct.php script to implement parameterized queries or prepared statements, eliminating direct SQL concatenation with user input. 2. Implement strict input validation and sanitization on the 'Username' parameter and all other user inputs. 3. Apply the principle of least privilege on database accounts used by the application, restricting permissions to only necessary operations. 4. Monitor web application logs for suspicious SQL query patterns or repeated failed attempts indicative of injection attempts. 5. If possible, isolate the Online Farm System in a segmented network zone to limit lateral movement in case of compromise. 6. Deploy Web Application Firewalls (WAFs) with rules to detect and block SQL injection payloads targeting the vulnerable endpoint. 7. Engage with the vendor or community to obtain or develop official patches or updates. 8. Educate development teams on secure coding practices to prevent similar vulnerabilities in future releases. 9. Conduct penetration testing focusing on injection flaws to verify the effectiveness of mitigations.
Affected Countries
Germany, France, Netherlands, Italy, Spain, Poland
CVE-2025-15049: SQL Injection in code-projects Online Farm System
Description
A vulnerability was identified in code-projects Online Farm System 1.0. Affected is an unknown function of the file /addProduct.php. The manipulation of the argument Username leads to sql injection. The attack may be initiated remotely. The exploit is publicly available and might be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-15049 identifies a SQL injection vulnerability in the Online Farm System version 1.0 developed by code-projects. The flaw exists in the /addProduct.php script where the 'Username' parameter is not properly sanitized or validated before being incorporated into SQL queries. This allows an unauthenticated remote attacker to inject arbitrary SQL code, potentially manipulating the backend database. The vulnerability does not require privileges or user interaction, making it easier to exploit remotely. The impact includes unauthorized data disclosure, modification, or deletion, which can compromise the confidentiality, integrity, and availability of the system's data. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no authentication required (AT:N), no user interaction (UI:N), and low to medium impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although no active exploits are reported, a public exploit exists, increasing the risk of exploitation. The vulnerability affects only version 1.0 of the product, which is likely an early release. No official patches have been linked yet, so mitigation relies on secure coding practices and configuration changes. This vulnerability is particularly critical for organizations relying on this software for farm management, as it could lead to operational disruption or data breaches.
Potential Impact
For European organizations, especially those in the agriculture sector using the Online Farm System 1.0, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to sensitive farm management data, including product inventories, user credentials, and operational details. This could result in data breaches, loss of intellectual property, or manipulation of farm product records, potentially disrupting supply chains. The integrity of data could be compromised, leading to incorrect product information or fraudulent transactions. Availability could also be affected if attackers execute destructive SQL commands. Given the remote and unauthenticated nature of the exploit, attackers could target multiple organizations en masse. This risk is heightened in countries with advanced agricultural technology adoption and digital farm management systems. The lack of patches means organizations must act quickly to implement mitigations to avoid operational and reputational damage.
Mitigation Recommendations
1. Immediate code review and remediation of the /addProduct.php script to implement parameterized queries or prepared statements, eliminating direct SQL concatenation with user input. 2. Implement strict input validation and sanitization on the 'Username' parameter and all other user inputs. 3. Apply the principle of least privilege on database accounts used by the application, restricting permissions to only necessary operations. 4. Monitor web application logs for suspicious SQL query patterns or repeated failed attempts indicative of injection attempts. 5. If possible, isolate the Online Farm System in a segmented network zone to limit lateral movement in case of compromise. 6. Deploy Web Application Firewalls (WAFs) with rules to detect and block SQL injection payloads targeting the vulnerable endpoint. 7. Engage with the vendor or community to obtain or develop official patches or updates. 8. Educate development teams on secure coding practices to prevent similar vulnerabilities in future releases. 9. Conduct penetration testing focusing on injection flaws to verify the effectiveness of mitigations.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-23T14:17:06.535Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 694b21afd0b9012ffd6d18db
Added to database: 12/23/2025, 11:11:43 PM
Last enriched: 12/23/2025, 11:27:07 PM
Last updated: 12/24/2025, 2:55:49 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15050: Unrestricted Upload in code-projects Student File Management System
MediumCVE-2025-15048: Command Injection in Tenda WH450
MediumCVE-2025-68696: CWE-918: Server-Side Request Forgery (SSRF) in jnunemaker httparty
HighCVE-2025-68665: CWE-502: Deserialization of Untrusted Data in langchain-ai langchainjs
HighCVE-2025-68664: CWE-502: Deserialization of Untrusted Data in langchain-ai langchain
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.