CVE-2025-15186: SQL Injection in code-projects Refugee Food Management System
A vulnerability has been found in code-projects Refugee Food Management System 1.0. Affected by this issue is some unknown functionality of the file /home/addusers.php. Such manipulation of the argument a leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-15186 identifies a SQL injection vulnerability in the Refugee Food Management System version 1.0 developed by code-projects. The vulnerability resides in the /home/addusers.php script, specifically involving the 'a' parameter, which is improperly sanitized, allowing attackers to inject malicious SQL statements. This injection flaw enables remote exploitation without requiring authentication or user interaction, making it a significant risk. The attacker can manipulate database queries to access, modify, or delete sensitive data stored within the backend database, potentially compromising the confidentiality, integrity, and availability of the system. The vulnerability has been publicly disclosed, although no active exploits have been reported yet. The CVSS 4.0 base score is 6.9, reflecting medium severity, with attack vector network (remote), low attack complexity, no privileges or user interaction required, and limited impact on confidentiality, integrity, and availability. The Refugee Food Management System is typically used in humanitarian contexts to manage food distribution for refugees, meaning the data involved may include personal and logistical information critical to operations. The lack of available patches or updates at this time necessitates immediate attention to mitigate risk. Organizations should review their deployment of this software, implement input validation and parameterized queries, and monitor database logs for anomalous activity to prevent exploitation.
Potential Impact
For European organizations, particularly NGOs, governmental agencies, and humanitarian groups managing refugee food distribution, exploitation of this vulnerability could lead to unauthorized access to sensitive personal data of refugees, disruption of food supply chains, and manipulation of operational data. This could result in privacy violations, operational delays, and loss of trust among stakeholders. The integrity of the food management data is critical for ensuring equitable and timely distribution; compromise could lead to resource misallocation or denial of service to vulnerable populations. Additionally, data breaches could trigger regulatory penalties under GDPR due to exposure of personal data. The remote and unauthenticated nature of the exploit increases the risk of attacks from external threat actors, including cybercriminals or politically motivated groups targeting refugee support infrastructure. The medium severity suggests a moderate but tangible risk that requires proactive mitigation to avoid operational and reputational damage.
Mitigation Recommendations
1. Implement strict input validation and sanitization on all user-supplied parameters, especially the 'a' parameter in /home/addusers.php. 2. Refactor database access code to use parameterized queries or prepared statements to prevent SQL injection. 3. Conduct a comprehensive code review of the Refugee Food Management System to identify and remediate other potential injection points. 4. Deploy Web Application Firewalls (WAF) with rules tailored to detect and block SQL injection attempts targeting this application. 5. Monitor database logs and application logs for unusual query patterns or errors indicative of injection attempts. 6. Restrict database user privileges to the minimum necessary to limit the impact of a successful injection. 7. If possible, isolate the Refugee Food Management System within a segmented network zone to reduce exposure. 8. Engage with the vendor or community to obtain patches or updates addressing this vulnerability. 9. Educate system administrators and developers on secure coding practices and the importance of timely patching. 10. Prepare an incident response plan specific to potential exploitation scenarios involving this system.
Affected Countries
Germany, France, Sweden, Netherlands, Italy, Belgium, United Kingdom
CVE-2025-15186: SQL Injection in code-projects Refugee Food Management System
Description
A vulnerability has been found in code-projects Refugee Food Management System 1.0. Affected by this issue is some unknown functionality of the file /home/addusers.php. Such manipulation of the argument a leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-15186 identifies a SQL injection vulnerability in the Refugee Food Management System version 1.0 developed by code-projects. The vulnerability resides in the /home/addusers.php script, specifically involving the 'a' parameter, which is improperly sanitized, allowing attackers to inject malicious SQL statements. This injection flaw enables remote exploitation without requiring authentication or user interaction, making it a significant risk. The attacker can manipulate database queries to access, modify, or delete sensitive data stored within the backend database, potentially compromising the confidentiality, integrity, and availability of the system. The vulnerability has been publicly disclosed, although no active exploits have been reported yet. The CVSS 4.0 base score is 6.9, reflecting medium severity, with attack vector network (remote), low attack complexity, no privileges or user interaction required, and limited impact on confidentiality, integrity, and availability. The Refugee Food Management System is typically used in humanitarian contexts to manage food distribution for refugees, meaning the data involved may include personal and logistical information critical to operations. The lack of available patches or updates at this time necessitates immediate attention to mitigate risk. Organizations should review their deployment of this software, implement input validation and parameterized queries, and monitor database logs for anomalous activity to prevent exploitation.
Potential Impact
For European organizations, particularly NGOs, governmental agencies, and humanitarian groups managing refugee food distribution, exploitation of this vulnerability could lead to unauthorized access to sensitive personal data of refugees, disruption of food supply chains, and manipulation of operational data. This could result in privacy violations, operational delays, and loss of trust among stakeholders. The integrity of the food management data is critical for ensuring equitable and timely distribution; compromise could lead to resource misallocation or denial of service to vulnerable populations. Additionally, data breaches could trigger regulatory penalties under GDPR due to exposure of personal data. The remote and unauthenticated nature of the exploit increases the risk of attacks from external threat actors, including cybercriminals or politically motivated groups targeting refugee support infrastructure. The medium severity suggests a moderate but tangible risk that requires proactive mitigation to avoid operational and reputational damage.
Mitigation Recommendations
1. Implement strict input validation and sanitization on all user-supplied parameters, especially the 'a' parameter in /home/addusers.php. 2. Refactor database access code to use parameterized queries or prepared statements to prevent SQL injection. 3. Conduct a comprehensive code review of the Refugee Food Management System to identify and remediate other potential injection points. 4. Deploy Web Application Firewalls (WAF) with rules tailored to detect and block SQL injection attempts targeting this application. 5. Monitor database logs and application logs for unusual query patterns or errors indicative of injection attempts. 6. Restrict database user privileges to the minimum necessary to limit the impact of a successful injection. 7. If possible, isolate the Refugee Food Management System within a segmented network zone to reduce exposure. 8. Engage with the vendor or community to obtain patches or updates addressing this vulnerability. 9. Educate system administrators and developers on secure coding practices and the importance of timely patching. 10. Prepare an incident response plan specific to potential exploitation scenarios involving this system.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-28T08:33:50.292Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 695450bfdb813ff03e2bfc0f
Added to database: 12/30/2025, 10:22:55 PM
Last enriched: 12/30/2025, 11:53:12 PM
Last updated: 2/7/2026, 12:13:38 PM
Views: 37
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.