Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15181: SQL Injection in code-projects Refugee Food Management System

0
Medium
VulnerabilityCVE-2025-15181cvecve-2025-15181
Published: Mon Dec 29 2025 (12/29/2025, 09:02:05 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Refugee Food Management System

Description

A security flaw has been discovered in code-projects Refugee Food Management System 1.0. The impacted element is an unknown function of the file /home/pagenateRefugeesList.php. Performing manipulation of the argument rfid results in sql injection. Remote exploitation of the attack is possible. The exploit has been released to the public and may be exploited.

AI-Powered Analysis

AILast updated: 12/30/2025, 23:36:01 UTC

Technical Analysis

CVE-2025-15181 identifies a SQL injection vulnerability in the Refugee Food Management System version 1.0 developed by code-projects. The vulnerability is located in an unspecified function within the /home/pagenateRefugeesList.php file, where the 'rfid' parameter is improperly sanitized. An attacker can remotely manipulate this parameter to inject malicious SQL code, enabling unauthorized database queries. The vulnerability does not require any authentication or user interaction, making it remotely exploitable over the network. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P) indicates network attack vector, low attack complexity, no privileges or user interaction needed, and partial impacts on confidentiality, integrity, and availability. Although no active exploitation has been reported, the public release of exploit code increases the likelihood of attacks. The Refugee Food Management System is likely used in humanitarian contexts to manage food distribution to refugees, making the data sensitive and critical. Exploitation could lead to unauthorized disclosure of personal data, alteration of records, or denial of service through database manipulation. The lack of available patches necessitates immediate mitigation efforts by users of this software.

Potential Impact

For European organizations, especially NGOs, government agencies, and humanitarian groups managing refugee food distribution, this vulnerability poses significant risks. Exploitation could lead to unauthorized access to sensitive personal data of refugees, including identity and food allocation records, violating privacy regulations such as GDPR. Data integrity could be compromised, resulting in incorrect food distribution or denial of services to vulnerable populations. Availability impacts could disrupt critical humanitarian operations, potentially causing harm to refugees relying on timely food assistance. The public availability of exploit code increases the risk of opportunistic attacks, including by cybercriminals or state-sponsored actors targeting refugee support infrastructure. The medium severity score reflects the balance between ease of exploitation and partial impact on system security, but the critical nature of the affected data elevates the operational risk. European organizations must consider the reputational damage and legal consequences of data breaches in this sector.

Mitigation Recommendations

Given the absence of official patches, European organizations should implement immediate compensating controls. First, validate and sanitize all user inputs, especially the 'rfid' parameter, using strict whitelisting and parameterized SQL queries or prepared statements to prevent injection. Employ web application firewalls (WAFs) configured to detect and block SQL injection patterns targeting the vulnerable endpoint. Conduct thorough code reviews and security testing of the Refugee Food Management System to identify and remediate similar vulnerabilities. Restrict network access to the vulnerable application to trusted IP ranges and enforce strong access controls. Monitor database logs and application behavior for unusual queries or anomalies indicative of exploitation attempts. Engage with the vendor or community to obtain or develop patches and update the software promptly once available. Additionally, implement data encryption at rest and in transit to mitigate data exposure risks. Finally, train staff on secure coding practices and incident response procedures tailored to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-28T08:33:36.017Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695450b8db813ff03e2bf3d6

Added to database: 12/30/2025, 10:22:48 PM

Last enriched: 12/30/2025, 11:36:01 PM

Last updated: 2/7/2026, 1:37:47 AM

Views: 23

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats