CVE-2025-7191: SQL Injection in code-projects Student Enrollment System
A vulnerability has been found in code-projects Student Enrollment System 1.0 and classified as critical. This vulnerability affects unknown code of the file /login.php. The manipulation of the argument Username leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-7191 is a critical SQL Injection vulnerability identified in version 1.0 of the code-projects Student Enrollment System, specifically within the /login.php file. The vulnerability arises due to improper sanitization or validation of the 'Username' parameter, allowing an attacker to inject malicious SQL code remotely without any authentication or user interaction. This flaw enables an adversary to manipulate backend database queries, potentially leading to unauthorized data access, data modification, or even complete compromise of the database. The CVSS 4.0 vector indicates that the attack can be performed remotely (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and has low impact on confidentiality, integrity, and availability individually but combined can lead to significant risk. Although no known exploits are currently observed in the wild, the public disclosure of the vulnerability increases the risk of exploitation. The Student Enrollment System is typically used by educational institutions to manage student data, making the confidentiality and integrity of this information critical. The lack of available patches or mitigations from the vendor further elevates the risk for organizations relying on this software.
Potential Impact
For European organizations, particularly educational institutions using the affected Student Enrollment System 1.0, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to sensitive student data, including personal identification information, enrollment records, and possibly financial information. This breach could result in violations of the EU General Data Protection Regulation (GDPR), leading to severe legal and financial penalties. Furthermore, manipulation of enrollment data could disrupt academic operations, affecting the integrity of student records and institutional reputation. The remote and unauthenticated nature of the exploit increases the attack surface, making it easier for threat actors to target multiple institutions simultaneously. Given the critical nature of educational data and the increasing reliance on digital enrollment systems, the impact extends beyond data loss to potential operational disruption and loss of stakeholder trust.
Mitigation Recommendations
1. Immediate implementation of input validation and parameterized queries or prepared statements in the /login.php file to prevent SQL injection attacks. 2. Conduct a thorough code review of the entire Student Enrollment System to identify and remediate any other injection points or security weaknesses. 3. If vendor patches become available, prioritize their deployment across all affected systems. 4. Employ Web Application Firewalls (WAFs) configured to detect and block SQL injection attempts targeting the login endpoint. 5. Monitor logs for unusual login attempts or database errors indicative of injection attempts. 6. Restrict database user permissions to the minimum necessary to limit the impact of a potential injection attack. 7. Consider migrating to a more secure and actively maintained enrollment system if remediation is not feasible. 8. Educate IT staff and administrators on the risks of SQL injection and the importance of secure coding practices.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Austria
CVE-2025-7191: SQL Injection in code-projects Student Enrollment System
Description
A vulnerability has been found in code-projects Student Enrollment System 1.0 and classified as critical. This vulnerability affects unknown code of the file /login.php. The manipulation of the argument Username leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-7191 is a critical SQL Injection vulnerability identified in version 1.0 of the code-projects Student Enrollment System, specifically within the /login.php file. The vulnerability arises due to improper sanitization or validation of the 'Username' parameter, allowing an attacker to inject malicious SQL code remotely without any authentication or user interaction. This flaw enables an adversary to manipulate backend database queries, potentially leading to unauthorized data access, data modification, or even complete compromise of the database. The CVSS 4.0 vector indicates that the attack can be performed remotely (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and has low impact on confidentiality, integrity, and availability individually but combined can lead to significant risk. Although no known exploits are currently observed in the wild, the public disclosure of the vulnerability increases the risk of exploitation. The Student Enrollment System is typically used by educational institutions to manage student data, making the confidentiality and integrity of this information critical. The lack of available patches or mitigations from the vendor further elevates the risk for organizations relying on this software.
Potential Impact
For European organizations, particularly educational institutions using the affected Student Enrollment System 1.0, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to sensitive student data, including personal identification information, enrollment records, and possibly financial information. This breach could result in violations of the EU General Data Protection Regulation (GDPR), leading to severe legal and financial penalties. Furthermore, manipulation of enrollment data could disrupt academic operations, affecting the integrity of student records and institutional reputation. The remote and unauthenticated nature of the exploit increases the attack surface, making it easier for threat actors to target multiple institutions simultaneously. Given the critical nature of educational data and the increasing reliance on digital enrollment systems, the impact extends beyond data loss to potential operational disruption and loss of stakeholder trust.
Mitigation Recommendations
1. Immediate implementation of input validation and parameterized queries or prepared statements in the /login.php file to prevent SQL injection attacks. 2. Conduct a thorough code review of the entire Student Enrollment System to identify and remediate any other injection points or security weaknesses. 3. If vendor patches become available, prioritize their deployment across all affected systems. 4. Employ Web Application Firewalls (WAFs) configured to detect and block SQL injection attempts targeting the login endpoint. 5. Monitor logs for unusual login attempts or database errors indicative of injection attempts. 6. Restrict database user permissions to the minimum necessary to limit the impact of a potential injection attack. 7. Consider migrating to a more secure and actively maintained enrollment system if remediation is not feasible. 8. Educate IT staff and administrators on the risks of SQL injection and the importance of secure coding practices.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-07-07T08:19:15.479Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 686d6d446f40f0eb72f9d11a
Added to database: 7/8/2025, 7:11:00 PM
Last enriched: 7/15/2025, 9:54:34 PM
Last updated: 8/9/2025, 9:16:53 AM
Views: 25
Related Threats
CVE-2025-8671: CWE-404 Improper Resource Shutdown or Release in IETF HTTP Working Group HTTP/2
HighCVE-2025-48989: CWE-404 Improper Resource Shutdown or Release in Apache Software Foundation Apache Tomcat
HighCVE-2025-55280: CWE-312: Cleartext Storage of Sensitive Information in ZKTeco Co WL20 Biometric Attendance System
MediumCVE-2025-55279: CWE-798: Use of Hard-coded Credentials in ZKTeco Co WL20 Biometric Attendance System
MediumCVE-2025-54465: CWE-798: Use of Hard-coded Credentials in ZKTeco Co WL20 Biometric Attendance System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.