Skip to main content

CVE-2025-7174: SQL Injection in code-projects Library System

Medium
VulnerabilityCVE-2025-7174cvecve-2025-7174
Published: Tue Jul 08 2025 (07/08/2025, 10:32:05 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Library System

Description

A vulnerability was found in code-projects Library System 1.0 and classified as critical. This issue affects some unknown processing of the file /teacher-issue-book.php. The manipulation of the argument idn leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/08/2025, 10:56:12 UTC

Technical Analysis

CVE-2025-7174 is a critical SQL Injection vulnerability identified in version 1.0 of the code-projects Library System, specifically affecting the /teacher-issue-book.php file. The vulnerability arises from improper handling of the 'idn' parameter, which allows an attacker to inject malicious SQL code remotely without any authentication or user interaction. This flaw enables an attacker to manipulate backend database queries, potentially leading to unauthorized data access, data modification, or even complete compromise of the database. The vulnerability has a CVSS 4.0 base score of 6.9, indicating a medium severity level, with an attack vector that is network-based and requires no privileges or user interaction. The impact on confidentiality, integrity, and availability is low to medium, but the exploitability is high due to the lack of required authentication and ease of remote exploitation. Although no public exploits are currently known in the wild, the vulnerability has been disclosed publicly, increasing the risk of exploitation. The absence of available patches or mitigations from the vendor further exacerbates the threat. Given the nature of the affected system—a library management platform used potentially in educational institutions—the vulnerability could be leveraged to access sensitive student or staff data, alter records, or disrupt library operations.

Potential Impact

For European organizations, particularly educational institutions and libraries using the code-projects Library System 1.0, this vulnerability poses a significant risk. Exploitation could lead to unauthorized disclosure of personal data, including student and teacher information, violating GDPR regulations and resulting in legal and financial repercussions. Data integrity could be compromised by altering issued book records or user data, undermining trust in institutional systems. Availability impacts, while likely limited, could disrupt library services, affecting academic operations. The remote and unauthenticated nature of the attack vector increases the likelihood of exploitation, especially in environments with internet-facing library management systems. Additionally, the lack of patches means organizations must rely on mitigations or system upgrades, which may delay remediation and increase exposure time.

Mitigation Recommendations

European organizations should immediately audit their use of the code-projects Library System to identify any deployments of version 1.0. If present, they should isolate the affected systems from public networks or restrict access to trusted internal IP ranges using firewalls or network segmentation. Implementing Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'idn' parameter can provide temporary protection. Organizations should conduct thorough input validation and parameterized query reviews if they have access to the source code, applying fixes to sanitize inputs properly. Monitoring database logs for unusual queries or access patterns related to the vulnerable endpoint is recommended. If possible, migrating to a newer, patched version or alternative library management software is advised. Additionally, organizations must ensure that backups are current and tested to enable recovery in case of data compromise. Finally, staff training on incident detection and response related to web application attacks should be enhanced.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-07T07:53:47.327Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 686cf5656f40f0eb72f3f637

Added to database: 7/8/2025, 10:39:33 AM

Last enriched: 7/8/2025, 10:56:12 AM

Last updated: 7/8/2025, 1:06:37 PM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats