Skip to main content

CVE-2025-7595: SQL Injection in code-projects Job Diary

Medium
VulnerabilityCVE-2025-7595cvecve-2025-7595
Published: Mon Jul 14 2025 (07/14/2025, 10:14:05 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Job Diary

Description

A vulnerability was found in code-projects Job Diary 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /view-cad.php. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/14/2025, 10:46:20 UTC

Technical Analysis

CVE-2025-7595 is a critical SQL Injection vulnerability identified in version 1.0 of the code-projects Job Diary application. The vulnerability resides in the /view-cad.php file, specifically in the handling of the 'ID' parameter. An attacker can remotely manipulate this parameter without authentication or user interaction, injecting malicious SQL code. This injection can lead to unauthorized access, data leakage, data modification, or even complete compromise of the underlying database. The vulnerability is exploitable over the network (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and has low complexity (AC:L). The impact on confidentiality, integrity, and availability is low to medium individually but combined can be significant, as indicated by the CVSS 4.0 base score of 6.9 (medium severity). Although no public exploits are currently known in the wild, the disclosure of the exploit code increases the risk of exploitation. The lack of available patches or mitigation from the vendor further elevates the threat. The vulnerability does not affect the system or security scope beyond the application itself (SC:N, SI:N, SA:N).

Potential Impact

For European organizations using code-projects Job Diary 1.0, this vulnerability poses a significant risk to the confidentiality and integrity of their stored data. Attackers exploiting this flaw could extract sensitive business information, manipulate job diary entries, or disrupt business operations by corrupting data. Given the remote exploitability without authentication, attackers can target exposed instances over the internet or internal networks. This could lead to data breaches, regulatory non-compliance (e.g., GDPR violations), reputational damage, and operational disruptions. Organizations in sectors relying on this software for workforce or project management may face increased risk. The medium CVSS score suggests moderate impact, but the critical classification and lack of patches necessitate urgent attention.

Mitigation Recommendations

Since no official patches are currently available, European organizations should implement immediate compensating controls. These include: 1) Restricting access to the Job Diary application via network segmentation and firewall rules to trusted IP addresses only. 2) Employing Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'ID' parameter in /view-cad.php. 3) Conducting thorough input validation and sanitization on all user-supplied parameters, especially 'ID', if source code access and modification are possible. 4) Monitoring application logs for suspicious query patterns or repeated failed attempts indicative of injection attempts. 5) Planning for an upgrade or migration to a patched or alternative solution once available. 6) Educating IT and security teams about this vulnerability and ensuring incident response readiness. These targeted mitigations go beyond generic advice by focusing on access control, detection, and immediate risk reduction.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-13T13:07:54.528Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6874dc67a83201eaacc4eaed

Added to database: 7/14/2025, 10:31:03 AM

Last enriched: 7/14/2025, 10:46:20 AM

Last updated: 7/17/2025, 8:32:34 PM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats