CVE-2025-8238: SQL Injection in code-projects Exam Form Submission
A vulnerability classified as critical has been found in code-projects Exam Form Submission 1.0. Affected is an unknown function of the file /admin/update_s2.php. The manipulation of the argument credits leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-8238 is a critical SQL Injection vulnerability identified in version 1.0 of the code-projects Exam Form Submission application. The vulnerability exists in an unspecified function within the /admin/update_s2.php file, specifically related to the manipulation of the 'credits' argument. This flaw allows an unauthenticated remote attacker to inject malicious SQL code due to insufficient input validation or sanitization of the 'credits' parameter. Exploiting this vulnerability could enable attackers to execute arbitrary SQL commands on the backend database, potentially leading to unauthorized data access, data modification, or deletion. The vulnerability is remotely exploitable without requiring authentication or user interaction, increasing its risk profile. Although the CVSS 4.0 score is 6.9 (medium severity), the nature of SQL injection vulnerabilities typically implies a high risk due to their potential impact on confidentiality, integrity, and availability of data. The exploit has been publicly disclosed, which raises the likelihood of exploitation attempts, although no known exploits in the wild have been reported yet. The absence of available patches or mitigation guidance from the vendor further exacerbates the risk for users of this software version.
Potential Impact
For European organizations using code-projects Exam Form Submission 1.0, this vulnerability poses a significant risk to the confidentiality and integrity of sensitive data managed through the application, such as exam records or student information. Successful exploitation could lead to unauthorized data disclosure, data tampering, or even complete compromise of the underlying database. This could result in regulatory non-compliance, especially under GDPR, due to potential exposure of personal data. Additionally, the disruption or manipulation of exam-related data could undermine the integrity of academic processes, damaging institutional reputation and trust. Since the vulnerability is remotely exploitable without authentication, attackers could target exposed administrative endpoints directly, increasing the risk of widespread attacks if the software is deployed in publicly accessible environments.
Mitigation Recommendations
Given the lack of official patches, European organizations should immediately implement compensating controls. These include restricting access to the /admin/update_s2.php endpoint via network-level controls such as IP whitelisting or VPN access to limit exposure to trusted users only. Input validation and sanitization should be enforced at the application or web server level using web application firewalls (WAFs) configured to detect and block SQL injection attempts targeting the 'credits' parameter. Organizations should conduct thorough code reviews and consider applying custom patches or input filtering if possible. Monitoring and logging of all access to the vulnerable endpoint should be enhanced to detect suspicious activity promptly. Additionally, organizations should plan to upgrade to a patched version once available or consider alternative software solutions if patching is delayed. Regular backups of the database should be maintained to enable recovery in case of data compromise.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-8238: SQL Injection in code-projects Exam Form Submission
Description
A vulnerability classified as critical has been found in code-projects Exam Form Submission 1.0. Affected is an unknown function of the file /admin/update_s2.php. The manipulation of the argument credits leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-8238 is a critical SQL Injection vulnerability identified in version 1.0 of the code-projects Exam Form Submission application. The vulnerability exists in an unspecified function within the /admin/update_s2.php file, specifically related to the manipulation of the 'credits' argument. This flaw allows an unauthenticated remote attacker to inject malicious SQL code due to insufficient input validation or sanitization of the 'credits' parameter. Exploiting this vulnerability could enable attackers to execute arbitrary SQL commands on the backend database, potentially leading to unauthorized data access, data modification, or deletion. The vulnerability is remotely exploitable without requiring authentication or user interaction, increasing its risk profile. Although the CVSS 4.0 score is 6.9 (medium severity), the nature of SQL injection vulnerabilities typically implies a high risk due to their potential impact on confidentiality, integrity, and availability of data. The exploit has been publicly disclosed, which raises the likelihood of exploitation attempts, although no known exploits in the wild have been reported yet. The absence of available patches or mitigation guidance from the vendor further exacerbates the risk for users of this software version.
Potential Impact
For European organizations using code-projects Exam Form Submission 1.0, this vulnerability poses a significant risk to the confidentiality and integrity of sensitive data managed through the application, such as exam records or student information. Successful exploitation could lead to unauthorized data disclosure, data tampering, or even complete compromise of the underlying database. This could result in regulatory non-compliance, especially under GDPR, due to potential exposure of personal data. Additionally, the disruption or manipulation of exam-related data could undermine the integrity of academic processes, damaging institutional reputation and trust. Since the vulnerability is remotely exploitable without authentication, attackers could target exposed administrative endpoints directly, increasing the risk of widespread attacks if the software is deployed in publicly accessible environments.
Mitigation Recommendations
Given the lack of official patches, European organizations should immediately implement compensating controls. These include restricting access to the /admin/update_s2.php endpoint via network-level controls such as IP whitelisting or VPN access to limit exposure to trusted users only. Input validation and sanitization should be enforced at the application or web server level using web application firewalls (WAFs) configured to detect and block SQL injection attempts targeting the 'credits' parameter. Organizations should conduct thorough code reviews and consider applying custom patches or input filtering if possible. Monitoring and logging of all access to the vulnerable endpoint should be enhanced to detect suspicious activity promptly. Additionally, organizations should plan to upgrade to a patched version once available or consider alternative software solutions if patching is delayed. Regular backups of the database should be maintained to enable recovery in case of data compromise.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-07-26T13:44:05.814Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6886744bad5a09ad007636f7
Added to database: 7/27/2025, 6:47:39 PM
Last enriched: 7/27/2025, 7:02:40 PM
Last updated: 7/30/2025, 7:28:45 AM
Views: 11
Related Threats
CVE-2025-8292: Use after free in Google Chrome
HighCVE-2025-53944: CWE-285: Improper Authorization in Significant-Gravitas AutoGPT
HighCVE-2025-54573: CWE-287: Improper Authentication in cvat-ai cvat
MediumCVE-2025-43018: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in HP, Inc. Certain HP LaserJet Pro Printers
MediumCVE-2025-53357: CWE-639: Authorization Bypass Through User-Controlled Key in glpi-project glpi
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.