Skip to main content

CVE-2025-7179: SQL Injection in code-projects Library System

Medium
VulnerabilityCVE-2025-7179cvecve-2025-7179
Published: Tue Jul 08 2025 (07/08/2025, 13:02:05 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Library System

Description

A vulnerability classified as critical was found in code-projects Library System 1.0. This vulnerability affects unknown code of the file /add-teacher.php. The manipulation of the argument Username leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/08/2025, 13:39:44 UTC

Technical Analysis

CVE-2025-7179 is a SQL Injection vulnerability identified in version 1.0 of the code-projects Library System, specifically within the /add-teacher.php file. The vulnerability arises from improper sanitization or validation of the 'Username' parameter, which allows an attacker to inject malicious SQL code remotely without any authentication or user interaction. This injection flaw can lead to unauthorized access to the underlying database, enabling attackers to read, modify, or delete sensitive data stored within the system. Given that the vulnerability is remotely exploitable with low attack complexity and no privileges required, it poses a significant risk to the confidentiality, integrity, and availability of the affected system's data. Although the CVSS 4.0 score is 6.9 (medium severity), the potential for data leakage or manipulation in a library management context—where personal and institutional data may be stored—makes this a critical concern for organizations relying on this software. No official patches have been linked yet, and while no known exploits are reported in the wild, the public disclosure increases the risk of exploitation attempts.

Potential Impact

For European organizations using the code-projects Library System 1.0, this vulnerability could lead to severe data breaches involving personal information of staff, students, or patrons, as well as institutional records. Exploitation could disrupt library operations by corrupting or deleting data, impacting availability and trust in the system. Given the remote and unauthenticated nature of the attack, threat actors could target multiple institutions en masse, potentially leading to widespread operational disruption. Additionally, compromised data could lead to regulatory non-compliance under GDPR, resulting in legal and financial repercussions. The integrity of academic and administrative data could be undermined, affecting decision-making and institutional reputation.

Mitigation Recommendations

Immediate mitigation steps include implementing input validation and parameterized queries or prepared statements in the /add-teacher.php script to prevent SQL injection. Organizations should audit their current installations of the code-projects Library System to identify affected versions and restrict external access to the vulnerable endpoint via network segmentation or web application firewalls (WAFs) configured to detect and block SQL injection patterns. Until an official patch is released, applying virtual patching through WAF rules is critical. Regular monitoring of logs for suspicious SQL queries and unusual database activity should be established. Additionally, organizations should plan for timely updates once vendor patches become available and conduct security training for developers and administrators to prevent similar vulnerabilities in custom or third-party code.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-07T08:05:32.345Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 686d1c126f40f0eb72f54a96

Added to database: 7/8/2025, 1:24:34 PM

Last enriched: 7/8/2025, 1:39:44 PM

Last updated: 7/8/2025, 4:07:50 PM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats