CVE-2025-15181: SQL Injection in code-projects Refugee Food Management System
A security flaw has been discovered in code-projects Refugee Food Management System 1.0. The impacted element is an unknown function of the file /home/pagenateRefugeesList.php. Performing manipulation of the argument rfid results in sql injection. Remote exploitation of the attack is possible. The exploit has been released to the public and may be exploited.
AI Analysis
Technical Summary
CVE-2025-15181 identifies a SQL injection vulnerability in the Refugee Food Management System version 1.0 developed by code-projects. The vulnerability is located in an unspecified function within the /home/pagenateRefugeesList.php file, where the 'rfid' parameter is improperly sanitized. An attacker can remotely manipulate this parameter to inject malicious SQL code, enabling unauthorized database queries. The vulnerability does not require any authentication or user interaction, making it remotely exploitable over the network. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P) indicates network attack vector, low attack complexity, no privileges or user interaction needed, and partial impacts on confidentiality, integrity, and availability. Although no active exploitation has been reported, the public release of exploit code increases the likelihood of attacks. The Refugee Food Management System is likely used in humanitarian contexts to manage food distribution to refugees, making the data sensitive and critical. Exploitation could lead to unauthorized disclosure of personal data, alteration of records, or denial of service through database manipulation. The lack of available patches necessitates immediate mitigation efforts by users of this software.
Potential Impact
For European organizations, especially NGOs, government agencies, and humanitarian groups managing refugee food distribution, this vulnerability poses significant risks. Exploitation could lead to unauthorized access to sensitive personal data of refugees, including identity and food allocation records, violating privacy regulations such as GDPR. Data integrity could be compromised, resulting in incorrect food distribution or denial of services to vulnerable populations. Availability impacts could disrupt critical humanitarian operations, potentially causing harm to refugees relying on timely food assistance. The public availability of exploit code increases the risk of opportunistic attacks, including by cybercriminals or state-sponsored actors targeting refugee support infrastructure. The medium severity score reflects the balance between ease of exploitation and partial impact on system security, but the critical nature of the affected data elevates the operational risk. European organizations must consider the reputational damage and legal consequences of data breaches in this sector.
Mitigation Recommendations
Given the absence of official patches, European organizations should implement immediate compensating controls. First, validate and sanitize all user inputs, especially the 'rfid' parameter, using strict whitelisting and parameterized SQL queries or prepared statements to prevent injection. Employ web application firewalls (WAFs) configured to detect and block SQL injection patterns targeting the vulnerable endpoint. Conduct thorough code reviews and security testing of the Refugee Food Management System to identify and remediate similar vulnerabilities. Restrict network access to the vulnerable application to trusted IP ranges and enforce strong access controls. Monitor database logs and application behavior for unusual queries or anomalies indicative of exploitation attempts. Engage with the vendor or community to obtain or develop patches and update the software promptly once available. Additionally, implement data encryption at rest and in transit to mitigate data exposure risks. Finally, train staff on secure coding practices and incident response procedures tailored to this vulnerability.
Affected Countries
Germany, France, Italy, Sweden, Netherlands, Belgium, Greece, Spain
CVE-2025-15181: SQL Injection in code-projects Refugee Food Management System
Description
A security flaw has been discovered in code-projects Refugee Food Management System 1.0. The impacted element is an unknown function of the file /home/pagenateRefugeesList.php. Performing manipulation of the argument rfid results in sql injection. Remote exploitation of the attack is possible. The exploit has been released to the public and may be exploited.
AI-Powered Analysis
Technical Analysis
CVE-2025-15181 identifies a SQL injection vulnerability in the Refugee Food Management System version 1.0 developed by code-projects. The vulnerability is located in an unspecified function within the /home/pagenateRefugeesList.php file, where the 'rfid' parameter is improperly sanitized. An attacker can remotely manipulate this parameter to inject malicious SQL code, enabling unauthorized database queries. The vulnerability does not require any authentication or user interaction, making it remotely exploitable over the network. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P) indicates network attack vector, low attack complexity, no privileges or user interaction needed, and partial impacts on confidentiality, integrity, and availability. Although no active exploitation has been reported, the public release of exploit code increases the likelihood of attacks. The Refugee Food Management System is likely used in humanitarian contexts to manage food distribution to refugees, making the data sensitive and critical. Exploitation could lead to unauthorized disclosure of personal data, alteration of records, or denial of service through database manipulation. The lack of available patches necessitates immediate mitigation efforts by users of this software.
Potential Impact
For European organizations, especially NGOs, government agencies, and humanitarian groups managing refugee food distribution, this vulnerability poses significant risks. Exploitation could lead to unauthorized access to sensitive personal data of refugees, including identity and food allocation records, violating privacy regulations such as GDPR. Data integrity could be compromised, resulting in incorrect food distribution or denial of services to vulnerable populations. Availability impacts could disrupt critical humanitarian operations, potentially causing harm to refugees relying on timely food assistance. The public availability of exploit code increases the risk of opportunistic attacks, including by cybercriminals or state-sponsored actors targeting refugee support infrastructure. The medium severity score reflects the balance between ease of exploitation and partial impact on system security, but the critical nature of the affected data elevates the operational risk. European organizations must consider the reputational damage and legal consequences of data breaches in this sector.
Mitigation Recommendations
Given the absence of official patches, European organizations should implement immediate compensating controls. First, validate and sanitize all user inputs, especially the 'rfid' parameter, using strict whitelisting and parameterized SQL queries or prepared statements to prevent injection. Employ web application firewalls (WAFs) configured to detect and block SQL injection patterns targeting the vulnerable endpoint. Conduct thorough code reviews and security testing of the Refugee Food Management System to identify and remediate similar vulnerabilities. Restrict network access to the vulnerable application to trusted IP ranges and enforce strong access controls. Monitor database logs and application behavior for unusual queries or anomalies indicative of exploitation attempts. Engage with the vendor or community to obtain or develop patches and update the software promptly once available. Additionally, implement data encryption at rest and in transit to mitigate data exposure risks. Finally, train staff on secure coding practices and incident response procedures tailored to this vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-28T08:33:36.017Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 695450b8db813ff03e2bf3d6
Added to database: 12/30/2025, 10:22:48 PM
Last enriched: 12/30/2025, 11:36:01 PM
Last updated: 2/7/2026, 1:37:47 AM
Views: 23
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2071: Buffer Overflow in UTT 进取 520W
HighCVE-2026-25762: CWE-400: Uncontrolled Resource Consumption in adonisjs core
HighCVE-2026-25754: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in adonisjs core
HighCVE-2026-25644: CWE-295: Improper Certificate Validation in datahub-project datahub
HighCVE-2026-25804: CWE-287: Improper Authentication in antrea-io antrea
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.