CVE-2025-4243: SQL Injection in code-projects Online Bus Reservation System
A vulnerability, which was classified as critical, has been found in code-projects Online Bus Reservation System 1.0. Affected by this issue is some unknown functionality of the file /print.php. The manipulation of the argument ID leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-4243 is a SQL Injection vulnerability identified in version 1.0 of the code-projects Online Bus Reservation System, specifically within the /print.php file. The vulnerability arises from improper sanitization or validation of the 'ID' parameter, which an attacker can manipulate to inject malicious SQL code. This flaw allows an unauthenticated remote attacker to execute arbitrary SQL commands on the backend database. The vulnerability does not require user interaction or authentication, and the attack vector is network accessible (AV:N). The CVSS 4.0 base score is 5.3, indicating a medium severity level, reflecting limited impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). The attack complexity is low (AC:L), and no privileges or user interaction are needed. Although the vulnerability is classified as medium severity, SQL injection flaws can potentially be escalated to more severe impacts depending on the database configuration and the privileges of the database user. No public exploits are currently known in the wild, and no patches or mitigations have been officially released. The vulnerability was publicly disclosed on May 3, 2025. The Online Bus Reservation System is a web-based application used for managing bus ticket bookings, and the /print.php functionality likely relates to ticket or booking printouts, which may be accessed by customers or administrators. Exploitation could lead to unauthorized data access, data modification, or disruption of service, depending on the backend database and application logic.
Potential Impact
For European organizations using the code-projects Online Bus Reservation System version 1.0, this vulnerability poses a risk of unauthorized access to sensitive customer and operational data stored in the backend database. Given the nature of bus reservation systems, this may include personally identifiable information (PII), payment details, travel itineraries, and booking histories. Exploitation could result in data breaches, loss of customer trust, regulatory non-compliance (e.g., GDPR violations), and potential financial losses. Additionally, attackers could manipulate booking data, causing service disruptions or fraudulent bookings. The medium CVSS score suggests limited but non-negligible impact; however, if the database user has elevated privileges, the impact could escalate. European transportation and travel companies relying on this system could face operational interruptions and reputational damage. The vulnerability's remote exploitability without authentication increases the risk of automated attacks or mass scanning campaigns targeting vulnerable installations across Europe.
Mitigation Recommendations
Immediate mitigation should focus on input validation and sanitization of the 'ID' parameter in /print.php to prevent SQL injection. Developers should implement parameterized queries or prepared statements to safely handle user input. Organizations should audit their systems to identify any deployments of code-projects Online Bus Reservation System version 1.0 and prioritize patching or upgrading to a fixed version once available. In the absence of an official patch, applying Web Application Firewall (WAF) rules to detect and block SQL injection patterns targeting the 'ID' parameter can reduce exposure. Regular database access monitoring and anomaly detection should be enabled to identify suspicious query patterns. Restricting database user privileges to the minimum necessary can limit the impact of exploitation. Additionally, organizations should conduct security assessments and penetration tests focusing on this vulnerability. Backup and recovery plans should be verified to ensure rapid restoration in case of data compromise or corruption.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland, Sweden, Austria
CVE-2025-4243: SQL Injection in code-projects Online Bus Reservation System
Description
A vulnerability, which was classified as critical, has been found in code-projects Online Bus Reservation System 1.0. Affected by this issue is some unknown functionality of the file /print.php. The manipulation of the argument ID leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-4243 is a SQL Injection vulnerability identified in version 1.0 of the code-projects Online Bus Reservation System, specifically within the /print.php file. The vulnerability arises from improper sanitization or validation of the 'ID' parameter, which an attacker can manipulate to inject malicious SQL code. This flaw allows an unauthenticated remote attacker to execute arbitrary SQL commands on the backend database. The vulnerability does not require user interaction or authentication, and the attack vector is network accessible (AV:N). The CVSS 4.0 base score is 5.3, indicating a medium severity level, reflecting limited impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). The attack complexity is low (AC:L), and no privileges or user interaction are needed. Although the vulnerability is classified as medium severity, SQL injection flaws can potentially be escalated to more severe impacts depending on the database configuration and the privileges of the database user. No public exploits are currently known in the wild, and no patches or mitigations have been officially released. The vulnerability was publicly disclosed on May 3, 2025. The Online Bus Reservation System is a web-based application used for managing bus ticket bookings, and the /print.php functionality likely relates to ticket or booking printouts, which may be accessed by customers or administrators. Exploitation could lead to unauthorized data access, data modification, or disruption of service, depending on the backend database and application logic.
Potential Impact
For European organizations using the code-projects Online Bus Reservation System version 1.0, this vulnerability poses a risk of unauthorized access to sensitive customer and operational data stored in the backend database. Given the nature of bus reservation systems, this may include personally identifiable information (PII), payment details, travel itineraries, and booking histories. Exploitation could result in data breaches, loss of customer trust, regulatory non-compliance (e.g., GDPR violations), and potential financial losses. Additionally, attackers could manipulate booking data, causing service disruptions or fraudulent bookings. The medium CVSS score suggests limited but non-negligible impact; however, if the database user has elevated privileges, the impact could escalate. European transportation and travel companies relying on this system could face operational interruptions and reputational damage. The vulnerability's remote exploitability without authentication increases the risk of automated attacks or mass scanning campaigns targeting vulnerable installations across Europe.
Mitigation Recommendations
Immediate mitigation should focus on input validation and sanitization of the 'ID' parameter in /print.php to prevent SQL injection. Developers should implement parameterized queries or prepared statements to safely handle user input. Organizations should audit their systems to identify any deployments of code-projects Online Bus Reservation System version 1.0 and prioritize patching or upgrading to a fixed version once available. In the absence of an official patch, applying Web Application Firewall (WAF) rules to detect and block SQL injection patterns targeting the 'ID' parameter can reduce exposure. Regular database access monitoring and anomaly detection should be enabled to identify suspicious query patterns. Restricting database user privileges to the minimum necessary can limit the impact of exploitation. Additionally, organizations should conduct security assessments and penetration tests focusing on this vulnerability. Backup and recovery plans should be verified to ensure rapid restoration in case of data compromise or corruption.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-05-02T20:49:49.897Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682d981fc4522896dcbdc96f
Added to database: 5/21/2025, 9:08:47 AM
Last enriched: 7/7/2025, 1:11:13 AM
Last updated: 8/12/2025, 6:44:07 PM
Views: 13
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.