CVE-2025-5977: SQL Injection in code-projects School Fees Payment System
A vulnerability was found in code-projects School Fees Payment System 1.0 and classified as critical. This issue affects some unknown processing of the file /datatable.php. The manipulation of the argument sSortDir_0 leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-5977 is a critical SQL Injection vulnerability identified in version 1.0 of the code-projects School Fees Payment System. The flaw exists in the processing of the /datatable.php file, specifically through manipulation of the 'sSortDir_0' parameter. This parameter is used in a way that allows an attacker to inject arbitrary SQL commands into the backend database query without any authentication or user interaction. The vulnerability is remotely exploitable over the network, meaning an attacker can trigger it without prior access or credentials. The injection can lead to unauthorized data disclosure, data modification, or potentially full compromise of the database and underlying system. Although the CVSS 4.0 score is 6.9 (medium severity), the lack of authentication and remote exploitability elevate the risk, especially in environments where sensitive financial and personal data are processed. No official patches or mitigations have been published yet, and while no known exploits are currently observed in the wild, the public disclosure increases the likelihood of exploitation attempts. The vulnerability impacts the confidentiality, integrity, and availability of the affected system, as attackers could extract sensitive student and payment data, alter payment records, or disrupt payment processing services.
Potential Impact
For European organizations, especially educational institutions and financial departments managing school fee payments, this vulnerability poses a significant risk. Exploitation could lead to exposure of personally identifiable information (PII) of students and parents, financial transaction details, and internal payment records. This could result in regulatory non-compliance with GDPR due to data breaches, financial fraud, reputational damage, and operational disruption of fee collection processes. Given the critical nature of educational services and their reliance on timely fee processing, exploitation could also impact service availability, causing administrative delays and loss of trust among stakeholders. Furthermore, attackers could leverage this vulnerability as a foothold to pivot into broader internal networks, increasing the risk of wider organizational compromise.
Mitigation Recommendations
Immediate mitigation should include implementing input validation and parameterized queries or prepared statements to prevent SQL injection in the /datatable.php file, particularly sanitizing the 'sSortDir_0' parameter. Organizations should conduct a thorough code review of the payment system to identify and remediate similar injection points. If patching is not yet available, deploying a Web Application Firewall (WAF) with custom rules to detect and block suspicious SQL injection payloads targeting this parameter can reduce risk. Network segmentation should be enforced to limit access to the payment system backend. Logging and monitoring should be enhanced to detect anomalous queries or access patterns indicative of exploitation attempts. Additionally, organizations should prepare incident response plans specific to potential data breaches involving payment systems. Finally, consider migrating to updated or alternative payment systems with active security support if remediation is delayed.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-5977: SQL Injection in code-projects School Fees Payment System
Description
A vulnerability was found in code-projects School Fees Payment System 1.0 and classified as critical. This issue affects some unknown processing of the file /datatable.php. The manipulation of the argument sSortDir_0 leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-5977 is a critical SQL Injection vulnerability identified in version 1.0 of the code-projects School Fees Payment System. The flaw exists in the processing of the /datatable.php file, specifically through manipulation of the 'sSortDir_0' parameter. This parameter is used in a way that allows an attacker to inject arbitrary SQL commands into the backend database query without any authentication or user interaction. The vulnerability is remotely exploitable over the network, meaning an attacker can trigger it without prior access or credentials. The injection can lead to unauthorized data disclosure, data modification, or potentially full compromise of the database and underlying system. Although the CVSS 4.0 score is 6.9 (medium severity), the lack of authentication and remote exploitability elevate the risk, especially in environments where sensitive financial and personal data are processed. No official patches or mitigations have been published yet, and while no known exploits are currently observed in the wild, the public disclosure increases the likelihood of exploitation attempts. The vulnerability impacts the confidentiality, integrity, and availability of the affected system, as attackers could extract sensitive student and payment data, alter payment records, or disrupt payment processing services.
Potential Impact
For European organizations, especially educational institutions and financial departments managing school fee payments, this vulnerability poses a significant risk. Exploitation could lead to exposure of personally identifiable information (PII) of students and parents, financial transaction details, and internal payment records. This could result in regulatory non-compliance with GDPR due to data breaches, financial fraud, reputational damage, and operational disruption of fee collection processes. Given the critical nature of educational services and their reliance on timely fee processing, exploitation could also impact service availability, causing administrative delays and loss of trust among stakeholders. Furthermore, attackers could leverage this vulnerability as a foothold to pivot into broader internal networks, increasing the risk of wider organizational compromise.
Mitigation Recommendations
Immediate mitigation should include implementing input validation and parameterized queries or prepared statements to prevent SQL injection in the /datatable.php file, particularly sanitizing the 'sSortDir_0' parameter. Organizations should conduct a thorough code review of the payment system to identify and remediate similar injection points. If patching is not yet available, deploying a Web Application Firewall (WAF) with custom rules to detect and block suspicious SQL injection payloads targeting this parameter can reduce risk. Network segmentation should be enforced to limit access to the payment system backend. Logging and monitoring should be enhanced to detect anomalous queries or access patterns indicative of exploitation attempts. Additionally, organizations should prepare incident response plans specific to potential data breaches involving payment systems. Finally, consider migrating to updated or alternative payment systems with active security support if remediation is delayed.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-06-10T11:47:46.890Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 684891ea48de16fa2fcfc184
Added to database: 6/10/2025, 8:13:30 PM
Last enriched: 7/10/2025, 9:32:33 PM
Last updated: 1/7/2026, 4:16:46 AM
Views: 48
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-20893: Origin validation error in Fujitsu Client Computing Limited Fujitsu Security Solution AuthConductor Client Basic V2
HighCVE-2025-14891: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ivole Customer Reviews for WooCommerce
MediumCVE-2025-14059: CWE-73 External Control of File Name or Path in roxnor EmailKit – Email Customizer for WooCommerce & WP
MediumCVE-2025-12648: CWE-552 Files or Directories Accessible to External Parties in cbutlerjr WP-Members Membership Plugin
MediumCVE-2025-14631: CWE-476 NULL Pointer Dereference in TP-Link Systems Inc. Archer BE400
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.