CVE-2025-5004: SQL Injection in projectworlds Online Time Table Generator
A vulnerability was found in projectworlds Online Time Table Generator 1.0 and classified as critical. This issue affects some unknown processing of the file /admin/add_course.php. The manipulation of the argument c/subname leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-5004 is a SQL Injection vulnerability identified in version 1.0 of the projectworlds Online Time Table Generator application. The vulnerability arises from improper sanitization or validation of the 'c/subname' parameter in the /admin/add_course.php script. An attacker can remotely manipulate this parameter to inject malicious SQL code, potentially altering the intended SQL queries executed by the backend database. This can lead to unauthorized data access, data modification, or even complete compromise of the database. The vulnerability does not require authentication, user interaction, or privileges, and can be exploited over the network, making it accessible to remote attackers. The CVSS 4.0 score is 6.9, classified as medium severity, reflecting the ease of exploitation and the potential impact on confidentiality, integrity, and availability, though the impact is limited to low levels in these areas. No known exploits are currently observed in the wild, and no patches have been published yet. The vulnerability affects only version 1.0 of the product, which is a niche online timetable management tool likely used by educational institutions or organizations managing schedules. The lack of a patch and public exploit disclosure increases the risk of exploitation in unpatched environments.
Potential Impact
For European organizations, especially educational institutions, training centers, or small businesses using the projectworlds Online Time Table Generator 1.0, this vulnerability poses a significant risk. Successful exploitation could lead to unauthorized disclosure of sensitive scheduling data, modification or deletion of course or timetable information, and potential disruption of administrative operations. Although the CVSS score suggests medium severity, the impact on confidentiality and integrity can be critical for organizations relying heavily on accurate timetable data. Moreover, attackers could leverage this vulnerability as an initial foothold to pivot into broader network compromise if the timetable system is integrated with other internal systems. Given the remote exploitability without authentication, organizations face a heightened risk if the application is exposed to the internet without proper network segmentation or additional security controls.
Mitigation Recommendations
Organizations should immediately assess whether they are using projectworlds Online Time Table Generator version 1.0 and restrict access to the /admin/add_course.php endpoint to trusted administrators only, ideally via VPN or IP whitelisting. Implement web application firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the 'c/subname' parameter. Conduct thorough input validation and sanitization on all user-supplied data, especially parameters used in SQL queries. If possible, migrate to a newer, patched version of the software once available or consider alternative timetable management solutions with active security support. Regularly monitor logs for suspicious activity related to the vulnerable endpoint. Network segmentation should be enforced to isolate the timetable generator from critical internal systems. Finally, organizations should prepare incident response plans to quickly address any potential exploitation.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-5004: SQL Injection in projectworlds Online Time Table Generator
Description
A vulnerability was found in projectworlds Online Time Table Generator 1.0 and classified as critical. This issue affects some unknown processing of the file /admin/add_course.php. The manipulation of the argument c/subname leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-5004 is a SQL Injection vulnerability identified in version 1.0 of the projectworlds Online Time Table Generator application. The vulnerability arises from improper sanitization or validation of the 'c/subname' parameter in the /admin/add_course.php script. An attacker can remotely manipulate this parameter to inject malicious SQL code, potentially altering the intended SQL queries executed by the backend database. This can lead to unauthorized data access, data modification, or even complete compromise of the database. The vulnerability does not require authentication, user interaction, or privileges, and can be exploited over the network, making it accessible to remote attackers. The CVSS 4.0 score is 6.9, classified as medium severity, reflecting the ease of exploitation and the potential impact on confidentiality, integrity, and availability, though the impact is limited to low levels in these areas. No known exploits are currently observed in the wild, and no patches have been published yet. The vulnerability affects only version 1.0 of the product, which is a niche online timetable management tool likely used by educational institutions or organizations managing schedules. The lack of a patch and public exploit disclosure increases the risk of exploitation in unpatched environments.
Potential Impact
For European organizations, especially educational institutions, training centers, or small businesses using the projectworlds Online Time Table Generator 1.0, this vulnerability poses a significant risk. Successful exploitation could lead to unauthorized disclosure of sensitive scheduling data, modification or deletion of course or timetable information, and potential disruption of administrative operations. Although the CVSS score suggests medium severity, the impact on confidentiality and integrity can be critical for organizations relying heavily on accurate timetable data. Moreover, attackers could leverage this vulnerability as an initial foothold to pivot into broader network compromise if the timetable system is integrated with other internal systems. Given the remote exploitability without authentication, organizations face a heightened risk if the application is exposed to the internet without proper network segmentation or additional security controls.
Mitigation Recommendations
Organizations should immediately assess whether they are using projectworlds Online Time Table Generator version 1.0 and restrict access to the /admin/add_course.php endpoint to trusted administrators only, ideally via VPN or IP whitelisting. Implement web application firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the 'c/subname' parameter. Conduct thorough input validation and sanitization on all user-supplied data, especially parameters used in SQL queries. If possible, migrate to a newer, patched version of the software once available or consider alternative timetable management solutions with active security support. Regularly monitor logs for suspicious activity related to the vulnerable endpoint. Network segmentation should be enforced to isolate the timetable generator from critical internal systems. Finally, organizations should prepare incident response plans to quickly address any potential exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-05-20T13:22:04.572Z
- Cisa Enriched
- false
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682d03994d7c5ea9f4b3bd15
Added to database: 5/20/2025, 10:35:05 PM
Last enriched: 7/6/2025, 4:57:50 AM
Last updated: 8/18/2025, 11:32:44 PM
Views: 21
Related Threats
CVE-2025-9356: Stack-based Buffer Overflow in Linksys RE6250
HighCVE-2025-9355: Stack-based Buffer Overflow in Linksys RE6250
HighCVE-2025-43761: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Liferay Portal
MediumCVE-2025-24902: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in LabRedesCefetRJ WeGIA
CriticalCVE-2025-52451: CWE-20 Improper Input Validation in Salesforce Tableau Server
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.