Skip to main content

CVE-2025-8252: SQL Injection in code-projects Exam Form Submission

Medium
VulnerabilityCVE-2025-8252cvecve-2025-8252
Published: Mon Jul 28 2025 (07/28/2025, 02:02:05 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Exam Form Submission

Description

A vulnerability was found in code-projects Exam Form Submission 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/delete_s5.php. The manipulation of the argument ID leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/28/2025, 03:02:51 UTC

Technical Analysis

CVE-2025-8252 is a critical SQL Injection vulnerability identified in version 1.0 of the code-projects Exam Form Submission application. The vulnerability resides in the /admin/delete_s5.php file, specifically in the handling of the 'ID' parameter. An attacker can manipulate this parameter to inject malicious SQL code, which the backend database executes. This flaw allows an unauthenticated remote attacker to execute arbitrary SQL commands without any user interaction or privileges. The vulnerability impacts the confidentiality, integrity, and availability of the underlying database and potentially the entire application. Exploitation could lead to unauthorized data disclosure, data modification, or deletion, and in some cases, full system compromise depending on the database and application architecture. Although no public exploit is currently known to be actively used in the wild, the vulnerability has been publicly disclosed, increasing the risk of exploitation by attackers. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the network attack vector, no required privileges or user interaction, but limited impact on confidentiality, integrity, and availability (low to limited). The vulnerability is straightforward to exploit due to the lack of authentication and user interaction requirements, making it a significant risk for affected deployments.

Potential Impact

For European organizations using code-projects Exam Form Submission 1.0, this vulnerability poses a substantial risk. The SQL Injection could allow attackers to access sensitive student or examination data, manipulate exam records, or disrupt exam administration processes. This could lead to breaches of personal data protected under GDPR, resulting in legal penalties and reputational damage. Additionally, the integrity of exam results could be compromised, undermining trust in educational institutions. The availability of the exam system could also be affected if attackers delete or corrupt data, causing operational disruptions. Given the remote exploitability without authentication, attackers can target these systems at scale, increasing the threat landscape for educational institutions and any organizations relying on this software in Europe.

Mitigation Recommendations

Immediate mitigation should focus on applying patches or updates from the vendor; however, no patch links are currently available, so organizations must implement compensating controls. These include: 1) Implementing strict input validation and parameterized queries or prepared statements in the /admin/delete_s5.php script to prevent SQL Injection. 2) Restricting access to the /admin directory via network-level controls such as VPNs or IP whitelisting to limit exposure. 3) Employing Web Application Firewalls (WAFs) configured to detect and block SQL Injection attempts targeting the vulnerable parameter. 4) Conducting thorough code audits and penetration testing to identify and remediate similar injection flaws. 5) Monitoring logs for suspicious database queries or unusual access patterns to detect exploitation attempts early. 6) If possible, upgrading to a newer, patched version of the software once available. These steps go beyond generic advice by focusing on immediate protective measures and code-level remediation specific to the vulnerable component.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-26T15:46:19.999Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6886e4c8ad5a09ad00796c70

Added to database: 7/28/2025, 2:47:36 AM

Last enriched: 7/28/2025, 3:02:51 AM

Last updated: 8/30/2025, 1:19:09 PM

Views: 23

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats