Skip to main content

CVE-2025-7171: SQL Injection in code-projects Crime Reporting System

Medium
VulnerabilityCVE-2025-7171cvecve-2025-7171
Published: Tue Jul 08 2025 (07/08/2025, 09:02:15 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Crime Reporting System

Description

A vulnerability, which was classified as critical, has been found in code-projects Crime Reporting System 1.0. Affected by this issue is some unknown functionality of the file /policelogin.php. The manipulation of the argument email leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/08/2025, 09:39:43 UTC

Technical Analysis

CVE-2025-7171 is a critical SQL Injection vulnerability identified in version 1.0 of the code-projects Crime Reporting System, specifically within the /policelogin.php file. The vulnerability arises from improper sanitization or validation of the 'email' parameter, which is directly used in SQL queries. This flaw allows an unauthenticated remote attacker to inject malicious SQL code through the 'email' argument, potentially manipulating the backend database. The attack vector requires no authentication or user interaction, making exploitation straightforward. The vulnerability can lead to unauthorized data access, data modification, or even complete compromise of the underlying database. The CVSS 4.0 score is 6.9 (medium severity), reflecting the network attack vector, low attack complexity, and no privileges or user interaction needed, but with limited confidentiality, integrity, and availability impact. Although no public exploits are currently known in the wild, the vulnerability has been publicly disclosed, increasing the risk of exploitation by threat actors. The Crime Reporting System is likely used by law enforcement or related agencies to manage sensitive crime data, making this vulnerability particularly sensitive due to the nature of the information stored and processed.

Potential Impact

For European organizations, especially law enforcement agencies and public safety departments using the affected Crime Reporting System, this vulnerability poses significant risks. Exploitation could lead to unauthorized disclosure of sensitive crime reports, personal data of victims or suspects, and internal communications. This could undermine public trust, violate data protection regulations such as GDPR, and disrupt critical public safety operations. Additionally, attackers could alter or delete records, impacting the integrity of investigations and judicial processes. The remote and unauthenticated nature of the vulnerability increases the likelihood of exploitation, potentially enabling attackers to establish persistent access or pivot to other internal systems. The impact extends beyond confidentiality to integrity and availability, threatening operational continuity and legal compliance.

Mitigation Recommendations

Immediate mitigation should focus on applying patches or updates from the vendor once available. In the absence of official patches, organizations should implement input validation and parameterized queries (prepared statements) for the 'email' parameter in /policelogin.php to prevent SQL injection. Web application firewalls (WAFs) can be configured to detect and block SQL injection attempts targeting this endpoint. Conduct thorough code reviews and penetration testing to identify and remediate similar injection points. Restrict database user permissions to the minimum necessary to limit damage from potential exploitation. Monitor logs for suspicious activity related to the 'email' parameter and unusual database queries. Additionally, organizations should ensure regular backups of critical data and have incident response plans tailored to web application attacks. Awareness training for developers and administrators on secure coding practices is also recommended to prevent recurrence.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-07T07:52:17.406Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 686ce3d66f40f0eb72f2db74

Added to database: 7/8/2025, 9:24:38 AM

Last enriched: 7/8/2025, 9:39:43 AM

Last updated: 7/8/2025, 9:39:43 AM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats