Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15140: SQL Injection in saiftheboss7 onlinemcqexam

0
Medium
VulnerabilityCVE-2025-15140cvecve-2025-15140
Published: Sun Dec 28 2025 (12/28/2025, 14:32:06 UTC)
Source: CVE Database V5
Vendor/Project: saiftheboss7
Product: onlinemcqexam

Description

A vulnerability was found in saiftheboss7 onlinemcqexam up to 0e56806132971e49721db3ef01868098c7b42ada. This vulnerability affects unknown code of the file /admin/quesadd.php. Performing manipulation of the argument ans1/ans2 results in sql injection. The attack is possible to be carried out remotely. The exploit has been made public and could be used. This product adopts a rolling release strategy to maintain continuous delivery The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 12/30/2025, 23:44:27 UTC

Technical Analysis

CVE-2025-15140 identifies a SQL injection vulnerability in the saiftheboss7 onlinemcqexam application, affecting versions up to commit 0e56806132971e49721db3ef01868098c7b42ada. The vulnerability exists in the /admin/quesadd.php script, where the parameters ans1 and ans2 are not properly sanitized before being used in SQL queries. This allows a remote attacker to inject arbitrary SQL code without requiring authentication or user interaction, potentially leading to unauthorized data disclosure, data manipulation, or denial of service. The vulnerability is remotely exploitable over the network with low attack complexity and no privileges required, increasing the risk profile. The vendor follows a rolling release strategy but has not responded to vulnerability reports, and no patches or mitigations have been published. The CVSS 4.0 score is 6.9 (medium severity), reflecting the significant impact on confidentiality, integrity, and availability with ease of exploitation. The public disclosure of exploit code increases the likelihood of exploitation despite no known active attacks currently. The lack of vendor response and patch availability necessitates immediate defensive measures by users of this software.

Potential Impact

For European organizations using the onlinemcqexam platform, this vulnerability poses a significant risk of unauthorized access to sensitive examination data, user credentials, and administrative controls. Exploitation could lead to data breaches compromising student or employee information, manipulation of exam content or results, and potential disruption of examination services. This could damage organizational reputation, violate data protection regulations such as GDPR, and result in financial penalties. Educational institutions, certification bodies, and training providers relying on this software are particularly vulnerable. The ability to exploit remotely without authentication increases the attack surface, potentially allowing widespread attacks if the software is internet-facing. The absence of vendor patches means organizations must rely on internal mitigations to prevent exploitation.

Mitigation Recommendations

Organizations should immediately implement strict input validation and sanitization for the ans1 and ans2 parameters in the /admin/quesadd.php script, ideally by applying parameterized queries or prepared statements to prevent SQL injection. If source code modification is not feasible, deploy web application firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting these parameters. Restrict access to the /admin/ directory by IP whitelisting or VPN-only access to reduce exposure. Monitor logs for suspicious query patterns or repeated access attempts to the vulnerable endpoint. Conduct thorough security assessments of the onlinemcqexam deployment and consider isolating the database backend from direct web access. Engage with the vendor or community to track patch releases or updates. Finally, ensure regular backups of critical data to enable recovery in case of compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-27T10:14:45.852Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695450bbdb813ff03e2bf84e

Added to database: 12/30/2025, 10:22:51 PM

Last enriched: 12/30/2025, 11:44:27 PM

Last updated: 2/2/2026, 9:53:54 AM

Views: 28

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats