Skip to main content

CVE-2025-5633: SQL Injection in code-projects Content Management System

Medium
VulnerabilityCVE-2025-5633cvecve-2025-5633
Published: Thu Jun 05 2025 (06/05/2025, 03:31:04 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Content Management System

Description

A vulnerability was found in code-projects/anirbandutta9 Content Management System and News-Buzz 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/users.php. The manipulation of the argument delete leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/07/2025, 03:26:26 UTC

Technical Analysis

CVE-2025-5633 is a medium-severity SQL Injection vulnerability identified in version 1.0 of the code-projects/anirbandutta9 Content Management System (CMS) and News-Buzz platform. The vulnerability resides in the /admin/users.php file, specifically in the handling of the 'delete' argument. Improper sanitization or validation of this parameter allows an attacker to inject arbitrary SQL commands remotely without requiring user interaction or authentication, as indicated by the CVSS vector. This flaw could enable an attacker to manipulate backend database queries, potentially leading to unauthorized data access, modification, or deletion. Although the CVSS score is moderate (5.3), the vulnerability's remote exploitability and lack of required privileges make it a notable risk. The exploit has been publicly disclosed, increasing the likelihood of exploitation attempts, although no confirmed exploits in the wild have been reported yet. The vulnerability impacts the confidentiality, integrity, and availability of the CMS's data, as attackers could extract sensitive user information, alter user accounts, or disrupt CMS operations. The absence of a patch or mitigation guidance in the provided data suggests that affected users should prioritize protective measures promptly.

Potential Impact

For European organizations using the affected CMS version 1.0, this vulnerability poses a tangible risk to the security of their web applications and underlying data stores. Exploitation could lead to unauthorized disclosure of sensitive user data, including personal information managed by the CMS, which may contravene GDPR requirements and result in regulatory penalties. Integrity of user accounts and content could be compromised, potentially damaging organizational reputation and operational continuity. Additionally, attackers could leverage the vulnerability to escalate privileges or pivot within the network if the CMS is integrated with other internal systems. The remote and unauthenticated nature of the attack vector increases the threat surface, especially for organizations with publicly accessible administration interfaces. Given the public disclosure of the exploit, European entities face an elevated risk of targeted attacks, particularly those in sectors with high-value data or critical online presence.

Mitigation Recommendations

Organizations should immediately audit their use of the code-projects/anirbandutta9 CMS and News-Buzz 1.0 to determine exposure. If the affected version is in use, restricting access to the /admin/users.php endpoint via network-level controls such as IP whitelisting or VPN-only access can reduce exposure. Implementing Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'delete' parameter is recommended. In the absence of an official patch, code-level mitigation should be applied by sanitizing and validating all input parameters rigorously, using parameterized queries or prepared statements to prevent injection. Monitoring logs for suspicious database query patterns or repeated failed attempts to manipulate the 'delete' argument can aid early detection. Organizations should also consider migrating to a newer, patched version of the CMS once available or switching to alternative CMS platforms with active security support. Regular backups and incident response plans should be updated to handle potential data breaches stemming from exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-06-04T11:31:33.339Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 684115e3182aa0cae2ccf0e9

Added to database: 6/5/2025, 3:58:27 AM

Last enriched: 7/7/2025, 3:26:26 AM

Last updated: 8/6/2025, 8:18:28 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats