Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15198: SQL Injection in code-projects College Notes Uploading System

0
Medium
VulnerabilityCVE-2025-15198cvecve-2025-15198
Published: Mon Dec 29 2025 (12/29/2025, 17:32:05 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: College Notes Uploading System

Description

A weakness has been identified in code-projects College Notes Uploading System 1.0. This issue affects some unknown processing of the file /login.php. Executing manipulation of the argument User can lead to sql injection. The attack may be launched remotely. The exploit has been made available to the public and could be exploited.

AI-Powered Analysis

AILast updated: 12/30/2025, 23:18:43 UTC

Technical Analysis

CVE-2025-15198 identifies a SQL injection vulnerability in the College Notes Uploading System version 1.0 developed by code-projects. The vulnerability resides in the /login.php endpoint, specifically in the processing of the 'User' parameter. Due to insufficient input validation and lack of parameterized queries, an attacker can inject malicious SQL code remotely without authentication or user interaction. This can allow attackers to manipulate backend database queries, potentially extracting sensitive user credentials, modifying data, or disrupting application functionality. The vulnerability has a CVSS 4.0 score of 6.9, reflecting medium severity with network attack vector, low attack complexity, and no privileges or user interaction required. Although no active exploitation has been reported, the availability of a public exploit increases the risk of imminent attacks. The lack of patches or vendor-provided fixes necessitates immediate mitigation efforts. The vulnerability impacts confidentiality, integrity, and availability of the system's data and services. Given the educational context, compromised systems could expose student data, academic records, and internal communications, leading to privacy violations and reputational damage.

Potential Impact

For European organizations, particularly educational institutions using the College Notes Uploading System or similar platforms, this vulnerability poses a significant risk of unauthorized data disclosure and manipulation. Exploitation could lead to exposure of sensitive student and faculty information, academic records, and potentially credentials for other connected systems. Data integrity could be compromised, affecting the reliability of academic data and administrative processes. Availability may also be impacted if attackers leverage the vulnerability to disrupt login functionality or escalate attacks. The public availability of an exploit increases the likelihood of targeted attacks, especially in countries with large academic sectors or where this software is in use. Compliance with GDPR and other data protection regulations could be jeopardized if personal data is leaked, leading to legal and financial consequences.

Mitigation Recommendations

Immediate mitigation should focus on secure coding practices: sanitize and validate all user inputs, especially the 'User' parameter in /login.php, and implement parameterized queries or prepared statements to prevent SQL injection. In the absence of an official patch, organizations should consider deploying web application firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting this endpoint. Conduct thorough code reviews and penetration testing to identify and remediate similar vulnerabilities. Monitor logs for unusual database query patterns or failed login attempts indicative of exploitation attempts. Restrict database user permissions to the minimum necessary to limit potential damage. Educate developers and administrators about secure coding and incident response procedures. Finally, maintain regular backups and have an incident response plan ready to mitigate potential breaches.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-28T10:11:56.469Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695450b4db813ff03e2bef01

Added to database: 12/30/2025, 10:22:44 PM

Last enriched: 12/30/2025, 11:18:43 PM

Last updated: 2/7/2026, 2:24:05 PM

Views: 26

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats