CVE-2025-7171: SQL Injection in code-projects Crime Reporting System
A vulnerability, which was classified as critical, has been found in code-projects Crime Reporting System 1.0. Affected by this issue is some unknown functionality of the file /policelogin.php. The manipulation of the argument email leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-7171 is a critical SQL Injection vulnerability identified in version 1.0 of the code-projects Crime Reporting System, specifically within the /policelogin.php file. The vulnerability arises from improper sanitization or validation of the 'email' parameter, which is directly used in SQL queries. This flaw allows an unauthenticated remote attacker to inject malicious SQL code through the 'email' argument, potentially manipulating the backend database. The attack vector requires no authentication or user interaction, making exploitation straightforward. The vulnerability can lead to unauthorized data access, data modification, or even complete compromise of the underlying database. The CVSS 4.0 score is 6.9 (medium severity), reflecting the network attack vector, low attack complexity, and no privileges or user interaction needed, but with limited confidentiality, integrity, and availability impact. Although no public exploits are currently known in the wild, the vulnerability has been publicly disclosed, increasing the risk of exploitation by threat actors. The Crime Reporting System is likely used by law enforcement or related agencies to manage sensitive crime data, making this vulnerability particularly sensitive due to the nature of the information stored and processed.
Potential Impact
For European organizations, especially law enforcement agencies and public safety departments using the affected Crime Reporting System, this vulnerability poses significant risks. Exploitation could lead to unauthorized disclosure of sensitive crime reports, personal data of victims or suspects, and internal communications. This could undermine public trust, violate data protection regulations such as GDPR, and disrupt critical public safety operations. Additionally, attackers could alter or delete records, impacting the integrity of investigations and judicial processes. The remote and unauthenticated nature of the vulnerability increases the likelihood of exploitation, potentially enabling attackers to establish persistent access or pivot to other internal systems. The impact extends beyond confidentiality to integrity and availability, threatening operational continuity and legal compliance.
Mitigation Recommendations
Immediate mitigation should focus on applying patches or updates from the vendor once available. In the absence of official patches, organizations should implement input validation and parameterized queries (prepared statements) for the 'email' parameter in /policelogin.php to prevent SQL injection. Web application firewalls (WAFs) can be configured to detect and block SQL injection attempts targeting this endpoint. Conduct thorough code reviews and penetration testing to identify and remediate similar injection points. Restrict database user permissions to the minimum necessary to limit damage from potential exploitation. Monitor logs for suspicious activity related to the 'email' parameter and unusual database queries. Additionally, organizations should ensure regular backups of critical data and have incident response plans tailored to web application attacks. Awareness training for developers and administrators on secure coding practices is also recommended to prevent recurrence.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2025-7171: SQL Injection in code-projects Crime Reporting System
Description
A vulnerability, which was classified as critical, has been found in code-projects Crime Reporting System 1.0. Affected by this issue is some unknown functionality of the file /policelogin.php. The manipulation of the argument email leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-7171 is a critical SQL Injection vulnerability identified in version 1.0 of the code-projects Crime Reporting System, specifically within the /policelogin.php file. The vulnerability arises from improper sanitization or validation of the 'email' parameter, which is directly used in SQL queries. This flaw allows an unauthenticated remote attacker to inject malicious SQL code through the 'email' argument, potentially manipulating the backend database. The attack vector requires no authentication or user interaction, making exploitation straightforward. The vulnerability can lead to unauthorized data access, data modification, or even complete compromise of the underlying database. The CVSS 4.0 score is 6.9 (medium severity), reflecting the network attack vector, low attack complexity, and no privileges or user interaction needed, but with limited confidentiality, integrity, and availability impact. Although no public exploits are currently known in the wild, the vulnerability has been publicly disclosed, increasing the risk of exploitation by threat actors. The Crime Reporting System is likely used by law enforcement or related agencies to manage sensitive crime data, making this vulnerability particularly sensitive due to the nature of the information stored and processed.
Potential Impact
For European organizations, especially law enforcement agencies and public safety departments using the affected Crime Reporting System, this vulnerability poses significant risks. Exploitation could lead to unauthorized disclosure of sensitive crime reports, personal data of victims or suspects, and internal communications. This could undermine public trust, violate data protection regulations such as GDPR, and disrupt critical public safety operations. Additionally, attackers could alter or delete records, impacting the integrity of investigations and judicial processes. The remote and unauthenticated nature of the vulnerability increases the likelihood of exploitation, potentially enabling attackers to establish persistent access or pivot to other internal systems. The impact extends beyond confidentiality to integrity and availability, threatening operational continuity and legal compliance.
Mitigation Recommendations
Immediate mitigation should focus on applying patches or updates from the vendor once available. In the absence of official patches, organizations should implement input validation and parameterized queries (prepared statements) for the 'email' parameter in /policelogin.php to prevent SQL injection. Web application firewalls (WAFs) can be configured to detect and block SQL injection attempts targeting this endpoint. Conduct thorough code reviews and penetration testing to identify and remediate similar injection points. Restrict database user permissions to the minimum necessary to limit damage from potential exploitation. Monitor logs for suspicious activity related to the 'email' parameter and unusual database queries. Additionally, organizations should ensure regular backups of critical data and have incident response plans tailored to web application attacks. Awareness training for developers and administrators on secure coding practices is also recommended to prevent recurrence.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-07-07T07:52:17.406Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 686ce3d66f40f0eb72f2db74
Added to database: 7/8/2025, 9:24:38 AM
Last enriched: 7/8/2025, 9:39:43 AM
Last updated: 7/8/2025, 9:39:43 AM
Views: 2
Related Threats
[CVE-2025-32461] Tiki Wiki CMS Groupware <= 28.3 Two SSTI Vulnerabilities
MediumCVE-2025-7173: SQL Injection in code-projects Library System
MediumCVE-2025-7172: SQL Injection in code-projects Crime Reporting System
MediumCVE-2025-6744: CWE-94 Improper Control of Generation of Code ('Code Injection') in xTemos Woodmart
HighCVE-2025-7170: SQL Injection in code-projects Crime Reporting System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.