Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15195: SQL Injection in code-projects Assessment Management

0
Medium
VulnerabilityCVE-2025-15195cvecve-2025-15195
Published: Mon Dec 29 2025 (12/29/2025, 16:02:06 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Assessment Management

Description

A vulnerability was determined in code-projects Assessment Management 1.0. Affected by this issue is some unknown functionality of the file /admin/add-module.php. This manipulation of the argument linked[] causes sql injection. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized.

AI-Powered Analysis

AILast updated: 12/30/2025, 23:26:27 UTC

Technical Analysis

CVE-2025-15195 identifies a SQL injection vulnerability in code-projects Assessment Management version 1.0, specifically within the /admin/add-module.php script. The vulnerability arises from improper sanitization of the linked[] parameter, which is susceptible to malicious SQL payloads. An attacker can remotely exploit this flaw without requiring authentication or user interaction, enabling them to manipulate backend database queries. This can result in unauthorized data retrieval, modification, or deletion, potentially compromising the confidentiality, integrity, and availability of the system's data. The vulnerability has been assigned a CVSS 4.0 base score of 6.9, reflecting its medium severity, with characteristics including network attack vector, low complexity, no privileges or user interaction needed, and limited impact on confidentiality, integrity, and availability. Although no known exploits are currently active in the wild, the public disclosure increases the likelihood of future exploitation attempts. The affected product is niche software used for assessment management, which may be deployed in educational or organizational environments. The lack of available patches necessitates immediate mitigation efforts by administrators. The vulnerability's exploitation could lead to data breaches, unauthorized administrative access, or disruption of assessment processes, posing operational and reputational risks.

Potential Impact

For European organizations using code-projects Assessment Management 1.0, this vulnerability poses significant risks including unauthorized access to sensitive assessment data, potential data manipulation, and disruption of critical educational or organizational workflows. Confidentiality is at risk as attackers can extract sensitive information from the database. Integrity may be compromised through unauthorized data modification or deletion, affecting the reliability of assessment records. Availability could be impacted if attackers execute destructive SQL commands or cause database errors. The remote, unauthenticated nature of the exploit increases the attack surface and potential for widespread impact. Organizations in sectors such as education, certification bodies, or training providers that rely on this software are particularly vulnerable. The absence of known exploits in the wild currently limits immediate risk, but public disclosure means attackers may develop exploits soon. Failure to address this vulnerability could lead to regulatory compliance issues under GDPR due to potential personal data exposure, resulting in legal and financial consequences.

Mitigation Recommendations

Given the absence of an official patch, European organizations should implement immediate mitigations to reduce risk. First, restrict access to the /admin/add-module.php endpoint using network-level controls such as IP whitelisting or VPN access to limit exposure. Implement web application firewall (WAF) rules specifically designed to detect and block SQL injection attempts targeting the linked[] parameter. Conduct thorough input validation and sanitization on all parameters, especially linked[], employing parameterized queries or prepared statements to prevent injection. Regularly audit and monitor database logs for suspicious queries or anomalies. If possible, isolate the assessment management system within a segmented network zone to limit lateral movement in case of compromise. Maintain up-to-date backups of the database to enable recovery from potential data corruption. Finally, engage with the vendor or community to obtain patches or updates as they become available and plan for timely deployment.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-28T10:06:36.873Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695450b6db813ff03e2bf321

Added to database: 12/30/2025, 10:22:46 PM

Last enriched: 12/30/2025, 11:26:27 PM

Last updated: 2/4/2026, 8:55:46 PM

Views: 44

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats