Skip to main content

CVE-2025-7173: SQL Injection in code-projects Library System

Medium
VulnerabilityCVE-2025-7173cvecve-2025-7173
Published: Tue Jul 08 2025 (07/08/2025, 10:02:06 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Library System

Description

A vulnerability has been found in code-projects Library System 1.0 and classified as critical. This vulnerability affects unknown code of the file /add-student.php. The manipulation of the argument Username leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/08/2025, 10:24:30 UTC

Technical Analysis

CVE-2025-7173 is a critical SQL Injection vulnerability identified in version 1.0 of the code-projects Library System, specifically within the /add-student.php file. The vulnerability arises from improper sanitization or validation of the 'Username' parameter, which allows an attacker to inject malicious SQL code remotely without requiring authentication or user interaction. Exploiting this flaw could enable an attacker to manipulate the backend database queries, potentially leading to unauthorized data access, data modification, or deletion. The vulnerability has a CVSS 4.0 base score of 6.9, indicating a medium severity level, with an attack vector classified as network-based and no privileges or user interaction needed. Although no known exploits are currently reported in the wild, the public disclosure of the vulnerability increases the risk of exploitation. The lack of available patches or mitigations from the vendor further elevates the urgency for affected organizations to implement protective measures. Given the nature of the vulnerability, attackers could leverage it to compromise the confidentiality and integrity of sensitive student or library data, and potentially disrupt availability if destructive SQL commands are executed.

Potential Impact

For European organizations using the code-projects Library System 1.0, this vulnerability poses significant risks. Educational institutions, public libraries, and other organizations managing student or user data could face unauthorized disclosure of personal information, violating GDPR and other data protection regulations. Data integrity could be compromised, leading to corrupted records or unauthorized changes that affect operational reliability. Additionally, availability could be impacted if attackers execute destructive SQL commands or cause denial-of-service conditions. The reputational damage and potential regulatory penalties from data breaches could be substantial. Since the vulnerability can be exploited remotely without authentication, attackers from anywhere could target these systems, increasing the threat landscape. Organizations relying on this software must consider the criticality of their data and the potential operational disruptions when assessing the impact.

Mitigation Recommendations

Given the absence of official patches, European organizations should implement immediate compensating controls. These include deploying Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'Username' parameter in /add-student.php. Input validation and sanitization should be enforced at the application layer, if source code access is available, by implementing parameterized queries or prepared statements to prevent injection. Network segmentation can limit exposure of the vulnerable system to untrusted networks. Regular monitoring and logging of database queries and web server access should be enhanced to detect suspicious activity. Organizations should also consider restricting access to the vulnerable endpoint to trusted IP ranges where feasible. Finally, planning for an upgrade or migration to a patched or alternative library management system is recommended once a fix becomes available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-07T07:52:22.351Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 686cee576f40f0eb72f3c510

Added to database: 7/8/2025, 10:09:27 AM

Last enriched: 7/8/2025, 10:24:30 AM

Last updated: 8/19/2025, 7:52:50 PM

Views: 31

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats