Skip to main content

CVE-2025-4243: SQL Injection in code-projects Online Bus Reservation System

Medium
VulnerabilityCVE-2025-4243cvecve-2025-4243
Published: Sat May 03 2025 (05/03/2025, 19:00:07 UTC)
Source: CVE
Vendor/Project: code-projects
Product: Online Bus Reservation System

Description

A vulnerability, which was classified as critical, has been found in code-projects Online Bus Reservation System 1.0. Affected by this issue is some unknown functionality of the file /print.php. The manipulation of the argument ID leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/07/2025, 01:11:13 UTC

Technical Analysis

CVE-2025-4243 is a SQL Injection vulnerability identified in version 1.0 of the code-projects Online Bus Reservation System, specifically within the /print.php file. The vulnerability arises from improper sanitization or validation of the 'ID' parameter, which an attacker can manipulate to inject malicious SQL code. This flaw allows an unauthenticated remote attacker to execute arbitrary SQL commands on the backend database. The vulnerability does not require user interaction or authentication, and the attack vector is network accessible (AV:N). The CVSS 4.0 base score is 5.3, indicating a medium severity level, reflecting limited impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). The attack complexity is low (AC:L), and no privileges or user interaction are needed. Although the vulnerability is classified as medium severity, SQL injection flaws can potentially be escalated to more severe impacts depending on the database configuration and the privileges of the database user. No public exploits are currently known in the wild, and no patches or mitigations have been officially released. The vulnerability was publicly disclosed on May 3, 2025. The Online Bus Reservation System is a web-based application used for managing bus ticket bookings, and the /print.php functionality likely relates to ticket or booking printouts, which may be accessed by customers or administrators. Exploitation could lead to unauthorized data access, data modification, or disruption of service, depending on the backend database and application logic.

Potential Impact

For European organizations using the code-projects Online Bus Reservation System version 1.0, this vulnerability poses a risk of unauthorized access to sensitive customer and operational data stored in the backend database. Given the nature of bus reservation systems, this may include personally identifiable information (PII), payment details, travel itineraries, and booking histories. Exploitation could result in data breaches, loss of customer trust, regulatory non-compliance (e.g., GDPR violations), and potential financial losses. Additionally, attackers could manipulate booking data, causing service disruptions or fraudulent bookings. The medium CVSS score suggests limited but non-negligible impact; however, if the database user has elevated privileges, the impact could escalate. European transportation and travel companies relying on this system could face operational interruptions and reputational damage. The vulnerability's remote exploitability without authentication increases the risk of automated attacks or mass scanning campaigns targeting vulnerable installations across Europe.

Mitigation Recommendations

Immediate mitigation should focus on input validation and sanitization of the 'ID' parameter in /print.php to prevent SQL injection. Developers should implement parameterized queries or prepared statements to safely handle user input. Organizations should audit their systems to identify any deployments of code-projects Online Bus Reservation System version 1.0 and prioritize patching or upgrading to a fixed version once available. In the absence of an official patch, applying Web Application Firewall (WAF) rules to detect and block SQL injection patterns targeting the 'ID' parameter can reduce exposure. Regular database access monitoring and anomaly detection should be enabled to identify suspicious query patterns. Restricting database user privileges to the minimum necessary can limit the impact of exploitation. Additionally, organizations should conduct security assessments and penetration tests focusing on this vulnerability. Backup and recovery plans should be verified to ensure rapid restoration in case of data compromise or corruption.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-05-02T20:49:49.897Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682d981fc4522896dcbdc96f

Added to database: 5/21/2025, 9:08:47 AM

Last enriched: 7/7/2025, 1:11:13 AM

Last updated: 8/12/2025, 6:44:07 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats