CVE-2025-15208: SQL Injection in code-projects Refugee Food Management System
A security flaw has been discovered in code-projects Refugee Food Management System 1.0. Affected by this issue is some unknown functionality of the file /home/editrefugee.php. The manipulation of the argument rfid results in sql injection. The attack can be launched remotely. The exploit has been released to the public and may be exploited.
AI Analysis
Technical Summary
CVE-2025-15208 identifies a SQL injection vulnerability in the Refugee Food Management System version 1.0 developed by code-projects. The vulnerability resides in the /home/editrefugee.php script, specifically in the handling of the 'rfid' parameter. Due to insufficient input validation and sanitization, an attacker can craft malicious input to manipulate SQL queries executed by the backend database. This flaw allows remote attackers to execute arbitrary SQL commands without requiring authentication or user interaction, potentially leading to unauthorized data access, modification, or deletion. The CVSS 4.0 score of 6.9 (medium severity) reflects the network attack vector, low complexity, no privileges or user interaction needed, and partial impact on confidentiality, integrity, and availability. Although no exploits are currently reported in the wild, a public exploit has been released, increasing the likelihood of exploitation. The Refugee Food Management System is typically deployed in humanitarian contexts to manage food distribution for refugees, making the integrity and confidentiality of data critical. The vulnerability could be exploited to manipulate food distribution records, access sensitive personal data of refugees, or disrupt system availability, thereby impacting humanitarian operations.
Potential Impact
For European organizations, especially NGOs, government agencies, and humanitarian groups managing refugee food distribution, this vulnerability poses significant risks. Exploitation could lead to unauthorized disclosure of sensitive refugee information, undermining privacy and protection obligations under GDPR. Data integrity could be compromised, resulting in incorrect food allocation or fraudulent manipulation of records, potentially causing harm to vulnerable populations. Availability impacts could disrupt critical food management operations, delaying aid delivery. Given the public exploit availability, attackers could target these systems to cause operational disruption or data breaches. The medium severity indicates a moderate but tangible risk, particularly for organizations lacking robust security controls or patch management. The impact extends beyond technical loss to reputational damage and legal consequences under European data protection laws.
Mitigation Recommendations
Organizations should immediately audit their Refugee Food Management System installations to identify affected versions. Since no official patch links are provided, mitigation should focus on applying secure coding practices: implement strict input validation and sanitization on the 'rfid' parameter, preferably using parameterized queries or prepared statements to prevent SQL injection. Conduct code reviews and penetration testing to verify the absence of injection flaws. Deploy web application firewalls (WAFs) with SQL injection detection rules as a temporary protective measure. Monitor database logs for unusual queries or access patterns indicative of exploitation attempts. Restrict database user privileges to the minimum necessary to limit the impact of any injection. Additionally, organizations should establish incident response plans tailored to potential data breaches or operational disruptions. Engage with the vendor or community for updates or patches and plan for timely application once available.
Affected Countries
Germany, France, Italy, Sweden, Netherlands, Belgium, Greece
CVE-2025-15208: SQL Injection in code-projects Refugee Food Management System
Description
A security flaw has been discovered in code-projects Refugee Food Management System 1.0. Affected by this issue is some unknown functionality of the file /home/editrefugee.php. The manipulation of the argument rfid results in sql injection. The attack can be launched remotely. The exploit has been released to the public and may be exploited.
AI-Powered Analysis
Technical Analysis
CVE-2025-15208 identifies a SQL injection vulnerability in the Refugee Food Management System version 1.0 developed by code-projects. The vulnerability resides in the /home/editrefugee.php script, specifically in the handling of the 'rfid' parameter. Due to insufficient input validation and sanitization, an attacker can craft malicious input to manipulate SQL queries executed by the backend database. This flaw allows remote attackers to execute arbitrary SQL commands without requiring authentication or user interaction, potentially leading to unauthorized data access, modification, or deletion. The CVSS 4.0 score of 6.9 (medium severity) reflects the network attack vector, low complexity, no privileges or user interaction needed, and partial impact on confidentiality, integrity, and availability. Although no exploits are currently reported in the wild, a public exploit has been released, increasing the likelihood of exploitation. The Refugee Food Management System is typically deployed in humanitarian contexts to manage food distribution for refugees, making the integrity and confidentiality of data critical. The vulnerability could be exploited to manipulate food distribution records, access sensitive personal data of refugees, or disrupt system availability, thereby impacting humanitarian operations.
Potential Impact
For European organizations, especially NGOs, government agencies, and humanitarian groups managing refugee food distribution, this vulnerability poses significant risks. Exploitation could lead to unauthorized disclosure of sensitive refugee information, undermining privacy and protection obligations under GDPR. Data integrity could be compromised, resulting in incorrect food allocation or fraudulent manipulation of records, potentially causing harm to vulnerable populations. Availability impacts could disrupt critical food management operations, delaying aid delivery. Given the public exploit availability, attackers could target these systems to cause operational disruption or data breaches. The medium severity indicates a moderate but tangible risk, particularly for organizations lacking robust security controls or patch management. The impact extends beyond technical loss to reputational damage and legal consequences under European data protection laws.
Mitigation Recommendations
Organizations should immediately audit their Refugee Food Management System installations to identify affected versions. Since no official patch links are provided, mitigation should focus on applying secure coding practices: implement strict input validation and sanitization on the 'rfid' parameter, preferably using parameterized queries or prepared statements to prevent SQL injection. Conduct code reviews and penetration testing to verify the absence of injection flaws. Deploy web application firewalls (WAFs) with SQL injection detection rules as a temporary protective measure. Monitor database logs for unusual queries or access patterns indicative of exploitation attempts. Restrict database user privileges to the minimum necessary to limit the impact of any injection. Additionally, organizations should establish incident response plans tailored to potential data breaches or operational disruptions. Engage with the vendor or community for updates or patches and plan for timely application once available.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-28T13:04:37.033Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 695450a6db813ff03e2be2fa
Added to database: 12/30/2025, 10:22:30 PM
Last enriched: 12/30/2025, 10:39:37 PM
Last updated: 2/7/2026, 8:19:16 AM
Views: 38
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2078: Improper Authorization in yeqifu warehouse
MediumCVE-2026-25533: CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') in agentfront enclave
MediumCVE-2026-25123: CWE-918: Server-Side Request Forgery (SSRF) in homarr-labs homarr
MediumCVE-2025-68621: CWE-208: Observable Timing Discrepancy in TriliumNext Trilium
HighCVE-2026-2074: XML External Entity Reference in O2OA
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.