CVE-2025-15195: SQL Injection in code-projects Assessment Management
A vulnerability was determined in code-projects Assessment Management 1.0. Affected by this issue is some unknown functionality of the file /admin/add-module.php. This manipulation of the argument linked[] causes sql injection. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized.
AI Analysis
Technical Summary
CVE-2025-15195 identifies a SQL injection vulnerability in code-projects Assessment Management version 1.0, specifically within the /admin/add-module.php script. The vulnerability arises from improper sanitization of the linked[] parameter, which is susceptible to malicious SQL payloads. An attacker can remotely exploit this flaw without requiring authentication or user interaction, enabling them to manipulate backend database queries. This can result in unauthorized data retrieval, modification, or deletion, potentially compromising the confidentiality, integrity, and availability of the system's data. The vulnerability has been assigned a CVSS 4.0 base score of 6.9, reflecting its medium severity, with characteristics including network attack vector, low complexity, no privileges or user interaction needed, and limited impact on confidentiality, integrity, and availability. Although no known exploits are currently active in the wild, the public disclosure increases the likelihood of future exploitation attempts. The affected product is niche software used for assessment management, which may be deployed in educational or organizational environments. The lack of available patches necessitates immediate mitigation efforts by administrators. The vulnerability's exploitation could lead to data breaches, unauthorized administrative access, or disruption of assessment processes, posing operational and reputational risks.
Potential Impact
For European organizations using code-projects Assessment Management 1.0, this vulnerability poses significant risks including unauthorized access to sensitive assessment data, potential data manipulation, and disruption of critical educational or organizational workflows. Confidentiality is at risk as attackers can extract sensitive information from the database. Integrity may be compromised through unauthorized data modification or deletion, affecting the reliability of assessment records. Availability could be impacted if attackers execute destructive SQL commands or cause database errors. The remote, unauthenticated nature of the exploit increases the attack surface and potential for widespread impact. Organizations in sectors such as education, certification bodies, or training providers that rely on this software are particularly vulnerable. The absence of known exploits in the wild currently limits immediate risk, but public disclosure means attackers may develop exploits soon. Failure to address this vulnerability could lead to regulatory compliance issues under GDPR due to potential personal data exposure, resulting in legal and financial consequences.
Mitigation Recommendations
Given the absence of an official patch, European organizations should implement immediate mitigations to reduce risk. First, restrict access to the /admin/add-module.php endpoint using network-level controls such as IP whitelisting or VPN access to limit exposure. Implement web application firewall (WAF) rules specifically designed to detect and block SQL injection attempts targeting the linked[] parameter. Conduct thorough input validation and sanitization on all parameters, especially linked[], employing parameterized queries or prepared statements to prevent injection. Regularly audit and monitor database logs for suspicious queries or anomalies. If possible, isolate the assessment management system within a segmented network zone to limit lateral movement in case of compromise. Maintain up-to-date backups of the database to enable recovery from potential data corruption. Finally, engage with the vendor or community to obtain patches or updates as they become available and plan for timely deployment.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-15195: SQL Injection in code-projects Assessment Management
Description
A vulnerability was determined in code-projects Assessment Management 1.0. Affected by this issue is some unknown functionality of the file /admin/add-module.php. This manipulation of the argument linked[] causes sql injection. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized.
AI-Powered Analysis
Technical Analysis
CVE-2025-15195 identifies a SQL injection vulnerability in code-projects Assessment Management version 1.0, specifically within the /admin/add-module.php script. The vulnerability arises from improper sanitization of the linked[] parameter, which is susceptible to malicious SQL payloads. An attacker can remotely exploit this flaw without requiring authentication or user interaction, enabling them to manipulate backend database queries. This can result in unauthorized data retrieval, modification, or deletion, potentially compromising the confidentiality, integrity, and availability of the system's data. The vulnerability has been assigned a CVSS 4.0 base score of 6.9, reflecting its medium severity, with characteristics including network attack vector, low complexity, no privileges or user interaction needed, and limited impact on confidentiality, integrity, and availability. Although no known exploits are currently active in the wild, the public disclosure increases the likelihood of future exploitation attempts. The affected product is niche software used for assessment management, which may be deployed in educational or organizational environments. The lack of available patches necessitates immediate mitigation efforts by administrators. The vulnerability's exploitation could lead to data breaches, unauthorized administrative access, or disruption of assessment processes, posing operational and reputational risks.
Potential Impact
For European organizations using code-projects Assessment Management 1.0, this vulnerability poses significant risks including unauthorized access to sensitive assessment data, potential data manipulation, and disruption of critical educational or organizational workflows. Confidentiality is at risk as attackers can extract sensitive information from the database. Integrity may be compromised through unauthorized data modification or deletion, affecting the reliability of assessment records. Availability could be impacted if attackers execute destructive SQL commands or cause database errors. The remote, unauthenticated nature of the exploit increases the attack surface and potential for widespread impact. Organizations in sectors such as education, certification bodies, or training providers that rely on this software are particularly vulnerable. The absence of known exploits in the wild currently limits immediate risk, but public disclosure means attackers may develop exploits soon. Failure to address this vulnerability could lead to regulatory compliance issues under GDPR due to potential personal data exposure, resulting in legal and financial consequences.
Mitigation Recommendations
Given the absence of an official patch, European organizations should implement immediate mitigations to reduce risk. First, restrict access to the /admin/add-module.php endpoint using network-level controls such as IP whitelisting or VPN access to limit exposure. Implement web application firewall (WAF) rules specifically designed to detect and block SQL injection attempts targeting the linked[] parameter. Conduct thorough input validation and sanitization on all parameters, especially linked[], employing parameterized queries or prepared statements to prevent injection. Regularly audit and monitor database logs for suspicious queries or anomalies. If possible, isolate the assessment management system within a segmented network zone to limit lateral movement in case of compromise. Maintain up-to-date backups of the database to enable recovery from potential data corruption. Finally, engage with the vendor or community to obtain patches or updates as they become available and plan for timely deployment.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-28T10:06:36.873Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 695450b6db813ff03e2bf321
Added to database: 12/30/2025, 10:22:46 PM
Last enriched: 12/30/2025, 11:26:27 PM
Last updated: 2/4/2026, 8:55:46 PM
Views: 44
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25512: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Intermesh groupoffice
CriticalCVE-2026-25511: CWE-918: Server-Side Request Forgery (SSRF) in Intermesh groupoffice
HighCVE-2026-25499: CWE-1188: Insecure Default Initialization of Resource in bpg terraform-provider-proxmox
HighCVE-2026-1554: CWE-91 XML Injection (aka Blind XPath Injection) in Drupal Central Authentication System (CAS) Server
UnknownCVE-2026-1553: CWE-863 Incorrect Authorization in Drupal Drupal Canvas
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.