Skip to main content

CVE-2025-5756: SQL Injection in code-projects Real Estate Property Management System

Medium
VulnerabilityCVE-2025-5756cvecve-2025-5756
Published: Fri Jun 06 2025 (06/06/2025, 10:00:07 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Real Estate Property Management System

Description

A vulnerability was found in code-projects Real Estate Property Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /Admin/EditCity.php. The manipulation leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/07/2025, 18:13:29 UTC

Technical Analysis

CVE-2025-5756 is a critical SQL Injection vulnerability identified in version 1.0 of the code-projects Real Estate Property Management System, specifically within the /Admin/EditCity.php file. This vulnerability allows an unauthenticated remote attacker to manipulate input parameters in the EditCity functionality, injecting malicious SQL code that can alter the intended database queries. The injection flaw can lead to unauthorized access, data leakage, modification, or deletion of sensitive real estate management data stored in the backend database. The vulnerability does not require any user interaction or prior authentication, making it highly exploitable over the network. Although the CVSS 4.0 score is 6.9 (medium severity), the vector metrics indicate it is remotely exploitable with low attack complexity and no privileges or user interaction needed, which elevates its risk profile. The vulnerability affects the confidentiality, integrity, and availability of the system's data, potentially allowing attackers to extract sensitive client, property, or transactional information or disrupt system operations. No official patches or mitigations have been published yet, and while no exploits are currently known to be in the wild, public disclosure of the exploit code increases the risk of imminent attacks. The lack of segmentation or input validation in the affected module is the root cause of this injection flaw.

Potential Impact

For European organizations using the code-projects Real Estate Property Management System 1.0, this vulnerability poses a significant risk to the confidentiality and integrity of sensitive real estate data, including client personal information, property details, and transaction records. Exploitation could lead to data breaches, regulatory non-compliance (e.g., GDPR violations), reputational damage, and financial losses. The availability of the system could also be impacted if attackers execute destructive SQL commands or cause database corruption. Given the critical nature of real estate data and the regulatory environment in Europe, organizations could face legal penalties and loss of customer trust. Additionally, attackers might leverage this vulnerability as a foothold to pivot into broader internal networks, escalating the impact beyond just the affected application.

Mitigation Recommendations

Immediate mitigation steps include implementing strict input validation and parameterized queries or prepared statements in the /Admin/EditCity.php functionality to prevent SQL injection. Organizations should conduct a thorough code review of all database interaction points to identify and remediate similar injection flaws. Network-level protections such as Web Application Firewalls (WAFs) should be configured to detect and block SQL injection patterns targeting this endpoint. Access to the administration interface should be restricted using IP whitelisting or VPNs to reduce exposure. Monitoring and logging of database queries and application logs should be enhanced to detect suspicious activities. Since no official patches are available, organizations should consider isolating or disabling the vulnerable module temporarily until a vendor patch is released. Regular backups of the database should be maintained to enable recovery in case of data corruption or loss.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-06-05T21:46:49.144Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6842bf69182aa0cae20b29e6

Added to database: 6/6/2025, 10:14:01 AM

Last enriched: 7/7/2025, 6:13:29 PM

Last updated: 8/11/2025, 7:10:13 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats