Skip to main content

CVE-2025-7474: SQL Injection in code-projects Job Diary

Medium
VulnerabilityCVE-2025-7474cvecve-2025-7474
Published: Sat Jul 12 2025 (07/12/2025, 12:02:05 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Job Diary

Description

A vulnerability was found in code-projects Job Diary 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /search.php. The manipulation of the argument Search leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/12/2025, 12:31:09 UTC

Technical Analysis

CVE-2025-7474 is a critical SQL Injection vulnerability identified in version 1.0 of the code-projects Job Diary application. The vulnerability resides in the /search.php file, specifically in the handling of the 'Search' parameter. An attacker can manipulate this parameter to inject malicious SQL code, which the backend database executes. This flaw allows an unauthenticated remote attacker to execute arbitrary SQL commands without any user interaction or privileges. The vulnerability is exploitable over the network, making it accessible to attackers without requiring local access or authentication. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the ease of exploitation (no authentication, no user interaction) but limited impact on confidentiality, integrity, and availability (all rated low). The vulnerability does not affect system components beyond the database query layer, and there is no indication of privilege escalation or complete system compromise. No patches or fixes have been published yet, and no known exploits are reported in the wild, though the exploit details have been publicly disclosed, increasing the risk of exploitation. The lack of a CVE-assigned CWE code suggests incomplete classification, but the nature of the vulnerability is a classic SQL Injection, a well-understood and dangerous web application flaw. Organizations using Job Diary 1.0 should consider this a high-risk issue due to the potential for data leakage, unauthorized data manipulation, or denial of service through crafted SQL queries.

Potential Impact

For European organizations using code-projects Job Diary 1.0, this vulnerability poses a significant risk to the confidentiality and integrity of their data. Exploitation could lead to unauthorized access to sensitive information stored in the backend database, including potentially personal data protected under GDPR. The ability to execute arbitrary SQL commands could also allow attackers to modify or delete data, disrupting business operations and damaging data integrity. Although the CVSS score rates the impact as medium, the critical nature of SQL Injection and the lack of authentication requirements elevate the threat level, especially for organizations handling sensitive or regulated data. The remote exploitability means attackers can target affected systems from anywhere, increasing exposure. Additionally, the public disclosure of the exploit code increases the likelihood of opportunistic attacks. The absence of patches means organizations must rely on other mitigations until a fix is available. The impact on availability is limited but could be leveraged for denial of service attacks by injecting resource-intensive queries. Overall, European organizations using this software should prioritize addressing this vulnerability to avoid data breaches, regulatory penalties, and operational disruptions.

Mitigation Recommendations

1. Immediate mitigation should include implementing Web Application Firewall (WAF) rules to detect and block malicious SQL injection payloads targeting the /search.php endpoint, specifically filtering suspicious input in the 'Search' parameter. 2. Apply input validation and sanitization at the application level to reject or properly escape all user-supplied input before it reaches the database query. 3. Employ parameterized queries or prepared statements in the codebase to prevent direct concatenation of user input into SQL commands. 4. Restrict database user privileges to the minimum necessary, ensuring the application database account cannot perform destructive operations beyond its scope. 5. Monitor web server and database logs for unusual query patterns or spikes in errors that may indicate exploitation attempts. 6. Isolate the affected application in a segmented network zone to limit lateral movement if compromised. 7. Engage with the vendor or community to obtain or develop patches or updates addressing this vulnerability. 8. Conduct a thorough security review and penetration test of the Job Diary application to identify any additional vulnerabilities. 9. Educate developers and administrators on secure coding practices to prevent similar injection flaws in future versions.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-11T12:39:52.416Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68725207a83201eaacb45cd2

Added to database: 7/12/2025, 12:16:07 PM

Last enriched: 7/12/2025, 12:31:09 PM

Last updated: 7/12/2025, 12:31:09 PM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats