CVE-2025-7595: SQL Injection in code-projects Job Diary
A vulnerability was found in code-projects Job Diary 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /view-cad.php. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-7595 is a critical SQL Injection vulnerability identified in version 1.0 of the code-projects Job Diary application. The vulnerability resides in the /view-cad.php file, specifically in the handling of the 'ID' parameter. An attacker can remotely manipulate this parameter without authentication or user interaction, injecting malicious SQL code. This injection can lead to unauthorized access, data leakage, data modification, or even complete compromise of the underlying database. The vulnerability is exploitable over the network (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and has low complexity (AC:L). The impact on confidentiality, integrity, and availability is low to medium individually but combined can be significant, as indicated by the CVSS 4.0 base score of 6.9 (medium severity). Although no public exploits are currently known in the wild, the disclosure of the exploit code increases the risk of exploitation. The lack of available patches or mitigation from the vendor further elevates the threat. The vulnerability does not affect the system or security scope beyond the application itself (SC:N, SI:N, SA:N).
Potential Impact
For European organizations using code-projects Job Diary 1.0, this vulnerability poses a significant risk to the confidentiality and integrity of their stored data. Attackers exploiting this flaw could extract sensitive business information, manipulate job diary entries, or disrupt business operations by corrupting data. Given the remote exploitability without authentication, attackers can target exposed instances over the internet or internal networks. This could lead to data breaches, regulatory non-compliance (e.g., GDPR violations), reputational damage, and operational disruptions. Organizations in sectors relying on this software for workforce or project management may face increased risk. The medium CVSS score suggests moderate impact, but the critical classification and lack of patches necessitate urgent attention.
Mitigation Recommendations
Since no official patches are currently available, European organizations should implement immediate compensating controls. These include: 1) Restricting access to the Job Diary application via network segmentation and firewall rules to trusted IP addresses only. 2) Employing Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'ID' parameter in /view-cad.php. 3) Conducting thorough input validation and sanitization on all user-supplied parameters, especially 'ID', if source code access and modification are possible. 4) Monitoring application logs for suspicious query patterns or repeated failed attempts indicative of injection attempts. 5) Planning for an upgrade or migration to a patched or alternative solution once available. 6) Educating IT and security teams about this vulnerability and ensuring incident response readiness. These targeted mitigations go beyond generic advice by focusing on access control, detection, and immediate risk reduction.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-7595: SQL Injection in code-projects Job Diary
Description
A vulnerability was found in code-projects Job Diary 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /view-cad.php. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-7595 is a critical SQL Injection vulnerability identified in version 1.0 of the code-projects Job Diary application. The vulnerability resides in the /view-cad.php file, specifically in the handling of the 'ID' parameter. An attacker can remotely manipulate this parameter without authentication or user interaction, injecting malicious SQL code. This injection can lead to unauthorized access, data leakage, data modification, or even complete compromise of the underlying database. The vulnerability is exploitable over the network (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and has low complexity (AC:L). The impact on confidentiality, integrity, and availability is low to medium individually but combined can be significant, as indicated by the CVSS 4.0 base score of 6.9 (medium severity). Although no public exploits are currently known in the wild, the disclosure of the exploit code increases the risk of exploitation. The lack of available patches or mitigation from the vendor further elevates the threat. The vulnerability does not affect the system or security scope beyond the application itself (SC:N, SI:N, SA:N).
Potential Impact
For European organizations using code-projects Job Diary 1.0, this vulnerability poses a significant risk to the confidentiality and integrity of their stored data. Attackers exploiting this flaw could extract sensitive business information, manipulate job diary entries, or disrupt business operations by corrupting data. Given the remote exploitability without authentication, attackers can target exposed instances over the internet or internal networks. This could lead to data breaches, regulatory non-compliance (e.g., GDPR violations), reputational damage, and operational disruptions. Organizations in sectors relying on this software for workforce or project management may face increased risk. The medium CVSS score suggests moderate impact, but the critical classification and lack of patches necessitate urgent attention.
Mitigation Recommendations
Since no official patches are currently available, European organizations should implement immediate compensating controls. These include: 1) Restricting access to the Job Diary application via network segmentation and firewall rules to trusted IP addresses only. 2) Employing Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'ID' parameter in /view-cad.php. 3) Conducting thorough input validation and sanitization on all user-supplied parameters, especially 'ID', if source code access and modification are possible. 4) Monitoring application logs for suspicious query patterns or repeated failed attempts indicative of injection attempts. 5) Planning for an upgrade or migration to a patched or alternative solution once available. 6) Educating IT and security teams about this vulnerability and ensuring incident response readiness. These targeted mitigations go beyond generic advice by focusing on access control, detection, and immediate risk reduction.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-07-13T13:07:54.528Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6874dc67a83201eaacc4eaed
Added to database: 7/14/2025, 10:31:03 AM
Last enriched: 7/14/2025, 10:46:20 AM
Last updated: 7/17/2025, 8:32:34 PM
Views: 8
Related Threats
CVE-2025-7431: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ajay Knowledge Base
MediumCVE-2025-7767: Cross Site Scripting in PHPGurukul Art Gallery Management System
MediumCVE-2025-7765: SQL Injection in code-projects Online Appointment Booking System
MediumCVE-2025-7764: SQL Injection in code-projects Online Appointment Booking System
MediumCVE-2025-7763: Open Redirect in thinkgem JeeSite
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.