Skip to main content

CVE-2025-8238: SQL Injection in code-projects Exam Form Submission

Medium
VulnerabilityCVE-2025-8238cvecve-2025-8238
Published: Sun Jul 27 2025 (07/27/2025, 18:32:05 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Exam Form Submission

Description

A vulnerability classified as critical has been found in code-projects Exam Form Submission 1.0. Affected is an unknown function of the file /admin/update_s2.php. The manipulation of the argument credits leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/27/2025, 19:02:40 UTC

Technical Analysis

CVE-2025-8238 is a critical SQL Injection vulnerability identified in version 1.0 of the code-projects Exam Form Submission application. The vulnerability exists in an unspecified function within the /admin/update_s2.php file, specifically related to the manipulation of the 'credits' argument. This flaw allows an unauthenticated remote attacker to inject malicious SQL code due to insufficient input validation or sanitization of the 'credits' parameter. Exploiting this vulnerability could enable attackers to execute arbitrary SQL commands on the backend database, potentially leading to unauthorized data access, data modification, or deletion. The vulnerability is remotely exploitable without requiring authentication or user interaction, increasing its risk profile. Although the CVSS 4.0 score is 6.9 (medium severity), the nature of SQL injection vulnerabilities typically implies a high risk due to their potential impact on confidentiality, integrity, and availability of data. The exploit has been publicly disclosed, which raises the likelihood of exploitation attempts, although no known exploits in the wild have been reported yet. The absence of available patches or mitigation guidance from the vendor further exacerbates the risk for users of this software version.

Potential Impact

For European organizations using code-projects Exam Form Submission 1.0, this vulnerability poses a significant risk to the confidentiality and integrity of sensitive data managed through the application, such as exam records or student information. Successful exploitation could lead to unauthorized data disclosure, data tampering, or even complete compromise of the underlying database. This could result in regulatory non-compliance, especially under GDPR, due to potential exposure of personal data. Additionally, the disruption or manipulation of exam-related data could undermine the integrity of academic processes, damaging institutional reputation and trust. Since the vulnerability is remotely exploitable without authentication, attackers could target exposed administrative endpoints directly, increasing the risk of widespread attacks if the software is deployed in publicly accessible environments.

Mitigation Recommendations

Given the lack of official patches, European organizations should immediately implement compensating controls. These include restricting access to the /admin/update_s2.php endpoint via network-level controls such as IP whitelisting or VPN access to limit exposure to trusted users only. Input validation and sanitization should be enforced at the application or web server level using web application firewalls (WAFs) configured to detect and block SQL injection attempts targeting the 'credits' parameter. Organizations should conduct thorough code reviews and consider applying custom patches or input filtering if possible. Monitoring and logging of all access to the vulnerable endpoint should be enhanced to detect suspicious activity promptly. Additionally, organizations should plan to upgrade to a patched version once available or consider alternative software solutions if patching is delayed. Regular backups of the database should be maintained to enable recovery in case of data compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-26T13:44:05.814Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6886744bad5a09ad007636f7

Added to database: 7/27/2025, 6:47:39 PM

Last enriched: 7/27/2025, 7:02:40 PM

Last updated: 7/30/2025, 7:28:45 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats