Skip to main content

CVE-2025-8250: SQL Injection in code-projects Exam Form Submission

Medium
VulnerabilityCVE-2025-8250cvecve-2025-8250
Published: Mon Jul 28 2025 (07/28/2025, 01:04:06 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Exam Form Submission

Description

A vulnerability, which was classified as critical, was found in code-projects Exam Form Submission 1.0. Affected is an unknown function of the file /admin/update_s4.php. The manipulation of the argument credits leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/28/2025, 01:32:44 UTC

Technical Analysis

CVE-2025-8250 is a SQL Injection vulnerability identified in version 1.0 of the 'Exam Form Submission' application developed by code-projects. The vulnerability exists in an unspecified function within the /admin/update_s4.php file, where the 'credits' parameter is improperly sanitized, allowing an attacker to inject malicious SQL code. This flaw can be exploited remotely without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The vulnerability impacts the confidentiality, integrity, and availability of the underlying database, as attackers can manipulate SQL queries to extract sensitive data, modify records, or disrupt service. Although the CVSS 4.0 base score is 6.9, categorized as medium severity, the exploitability is relatively straightforward due to the lack of required privileges or user interaction. No patches or mitigations have been officially published yet, and while no known exploits are currently observed in the wild, the public disclosure of the vulnerability increases the risk of exploitation. The vulnerability's presence in an administrative script suggests that successful exploitation could lead to significant compromise of the application’s backend data, potentially affecting user records, exam data, or other critical information managed by the system.

Potential Impact

For European organizations using the 'Exam Form Submission' software, this vulnerability poses a substantial risk to data security and operational continuity. Exploitation could lead to unauthorized data access, including personal information of students or staff, exam results, and administrative records, violating GDPR and other data protection regulations. The integrity of exam data could be compromised, undermining trust in educational institutions or certification bodies. Additionally, attackers could disrupt services by corrupting database contents or causing denial of service, impacting organizational workflows. The remote and unauthenticated nature of the attack vector increases the likelihood of exploitation, especially in environments where the application is exposed to the internet without adequate network segmentation or web application firewalls. The lack of available patches means organizations must rely on immediate mitigations to reduce exposure. The reputational damage and potential regulatory penalties resulting from data breaches or service disruptions could be significant for affected European entities.

Mitigation Recommendations

Given the absence of official patches, European organizations should implement immediate compensating controls. These include deploying web application firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'credits' parameter in /admin/update_s4.php. Network segmentation should be enforced to restrict access to the administrative interface to trusted internal IP addresses only. Input validation and sanitization should be reviewed and enhanced in the application codebase, prioritizing the use of parameterized queries or prepared statements to prevent SQL injection. Organizations should conduct thorough code audits and penetration testing to identify similar vulnerabilities. Monitoring and logging of database queries and web server access should be intensified to detect anomalous activities indicative of exploitation attempts. Finally, organizations should prepare for rapid patch deployment once an official fix is released and consider isolating or disabling the vulnerable module if feasible until remediation is available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-26T15:46:12.647Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6886cfb0ad5a09ad00785a73

Added to database: 7/28/2025, 1:17:36 AM

Last enriched: 7/28/2025, 1:32:44 AM

Last updated: 7/30/2025, 3:21:29 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats