Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15208: SQL Injection in code-projects Refugee Food Management System

0
Medium
VulnerabilityCVE-2025-15208cvecve-2025-15208
Published: Mon Dec 29 2025 (12/29/2025, 22:32:08 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Refugee Food Management System

Description

A security flaw has been discovered in code-projects Refugee Food Management System 1.0. Affected by this issue is some unknown functionality of the file /home/editrefugee.php. The manipulation of the argument rfid results in sql injection. The attack can be launched remotely. The exploit has been released to the public and may be exploited.

AI-Powered Analysis

AILast updated: 12/30/2025, 22:39:37 UTC

Technical Analysis

CVE-2025-15208 identifies a SQL injection vulnerability in the Refugee Food Management System version 1.0 developed by code-projects. The vulnerability resides in the /home/editrefugee.php script, specifically in the handling of the 'rfid' parameter. Due to insufficient input validation and sanitization, an attacker can craft malicious input to manipulate SQL queries executed by the backend database. This flaw allows remote attackers to execute arbitrary SQL commands without requiring authentication or user interaction, potentially leading to unauthorized data access, modification, or deletion. The CVSS 4.0 score of 6.9 (medium severity) reflects the network attack vector, low complexity, no privileges or user interaction needed, and partial impact on confidentiality, integrity, and availability. Although no exploits are currently reported in the wild, a public exploit has been released, increasing the likelihood of exploitation. The Refugee Food Management System is typically deployed in humanitarian contexts to manage food distribution for refugees, making the integrity and confidentiality of data critical. The vulnerability could be exploited to manipulate food distribution records, access sensitive personal data of refugees, or disrupt system availability, thereby impacting humanitarian operations.

Potential Impact

For European organizations, especially NGOs, government agencies, and humanitarian groups managing refugee food distribution, this vulnerability poses significant risks. Exploitation could lead to unauthorized disclosure of sensitive refugee information, undermining privacy and protection obligations under GDPR. Data integrity could be compromised, resulting in incorrect food allocation or fraudulent manipulation of records, potentially causing harm to vulnerable populations. Availability impacts could disrupt critical food management operations, delaying aid delivery. Given the public exploit availability, attackers could target these systems to cause operational disruption or data breaches. The medium severity indicates a moderate but tangible risk, particularly for organizations lacking robust security controls or patch management. The impact extends beyond technical loss to reputational damage and legal consequences under European data protection laws.

Mitigation Recommendations

Organizations should immediately audit their Refugee Food Management System installations to identify affected versions. Since no official patch links are provided, mitigation should focus on applying secure coding practices: implement strict input validation and sanitization on the 'rfid' parameter, preferably using parameterized queries or prepared statements to prevent SQL injection. Conduct code reviews and penetration testing to verify the absence of injection flaws. Deploy web application firewalls (WAFs) with SQL injection detection rules as a temporary protective measure. Monitor database logs for unusual queries or access patterns indicative of exploitation attempts. Restrict database user privileges to the minimum necessary to limit the impact of any injection. Additionally, organizations should establish incident response plans tailored to potential data breaches or operational disruptions. Engage with the vendor or community for updates or patches and plan for timely application once available.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-28T13:04:37.033Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695450a6db813ff03e2be2fa

Added to database: 12/30/2025, 10:22:30 PM

Last enriched: 12/30/2025, 10:39:37 PM

Last updated: 2/7/2026, 8:19:16 AM

Views: 38

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats