CVE-2025-8252: SQL Injection in code-projects Exam Form Submission
A vulnerability was found in code-projects Exam Form Submission 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/delete_s5.php. The manipulation of the argument ID leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-8252 is a critical SQL Injection vulnerability identified in version 1.0 of the code-projects Exam Form Submission application. The vulnerability resides in the /admin/delete_s5.php file, specifically in the handling of the 'ID' parameter. An attacker can manipulate this parameter to inject malicious SQL code, which the backend database executes. This flaw allows an unauthenticated remote attacker to execute arbitrary SQL commands without any user interaction or privileges. The vulnerability impacts the confidentiality, integrity, and availability of the underlying database and potentially the entire application. Exploitation could lead to unauthorized data disclosure, data modification, or deletion, and in some cases, full system compromise depending on the database and application architecture. Although no public exploit is currently known to be actively used in the wild, the vulnerability has been publicly disclosed, increasing the risk of exploitation by attackers. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the network attack vector, no required privileges or user interaction, but limited impact on confidentiality, integrity, and availability (low to limited). The vulnerability is straightforward to exploit due to the lack of authentication and user interaction requirements, making it a significant risk for affected deployments.
Potential Impact
For European organizations using code-projects Exam Form Submission 1.0, this vulnerability poses a substantial risk. The SQL Injection could allow attackers to access sensitive student or examination data, manipulate exam records, or disrupt exam administration processes. This could lead to breaches of personal data protected under GDPR, resulting in legal penalties and reputational damage. Additionally, the integrity of exam results could be compromised, undermining trust in educational institutions. The availability of the exam system could also be affected if attackers delete or corrupt data, causing operational disruptions. Given the remote exploitability without authentication, attackers can target these systems at scale, increasing the threat landscape for educational institutions and any organizations relying on this software in Europe.
Mitigation Recommendations
Immediate mitigation should focus on applying patches or updates from the vendor; however, no patch links are currently available, so organizations must implement compensating controls. These include: 1) Implementing strict input validation and parameterized queries or prepared statements in the /admin/delete_s5.php script to prevent SQL Injection. 2) Restricting access to the /admin directory via network-level controls such as VPNs or IP whitelisting to limit exposure. 3) Employing Web Application Firewalls (WAFs) configured to detect and block SQL Injection attempts targeting the vulnerable parameter. 4) Conducting thorough code audits and penetration testing to identify and remediate similar injection flaws. 5) Monitoring logs for suspicious database queries or unusual access patterns to detect exploitation attempts early. 6) If possible, upgrading to a newer, patched version of the software once available. These steps go beyond generic advice by focusing on immediate protective measures and code-level remediation specific to the vulnerable component.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-8252: SQL Injection in code-projects Exam Form Submission
Description
A vulnerability was found in code-projects Exam Form Submission 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/delete_s5.php. The manipulation of the argument ID leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-8252 is a critical SQL Injection vulnerability identified in version 1.0 of the code-projects Exam Form Submission application. The vulnerability resides in the /admin/delete_s5.php file, specifically in the handling of the 'ID' parameter. An attacker can manipulate this parameter to inject malicious SQL code, which the backend database executes. This flaw allows an unauthenticated remote attacker to execute arbitrary SQL commands without any user interaction or privileges. The vulnerability impacts the confidentiality, integrity, and availability of the underlying database and potentially the entire application. Exploitation could lead to unauthorized data disclosure, data modification, or deletion, and in some cases, full system compromise depending on the database and application architecture. Although no public exploit is currently known to be actively used in the wild, the vulnerability has been publicly disclosed, increasing the risk of exploitation by attackers. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the network attack vector, no required privileges or user interaction, but limited impact on confidentiality, integrity, and availability (low to limited). The vulnerability is straightforward to exploit due to the lack of authentication and user interaction requirements, making it a significant risk for affected deployments.
Potential Impact
For European organizations using code-projects Exam Form Submission 1.0, this vulnerability poses a substantial risk. The SQL Injection could allow attackers to access sensitive student or examination data, manipulate exam records, or disrupt exam administration processes. This could lead to breaches of personal data protected under GDPR, resulting in legal penalties and reputational damage. Additionally, the integrity of exam results could be compromised, undermining trust in educational institutions. The availability of the exam system could also be affected if attackers delete or corrupt data, causing operational disruptions. Given the remote exploitability without authentication, attackers can target these systems at scale, increasing the threat landscape for educational institutions and any organizations relying on this software in Europe.
Mitigation Recommendations
Immediate mitigation should focus on applying patches or updates from the vendor; however, no patch links are currently available, so organizations must implement compensating controls. These include: 1) Implementing strict input validation and parameterized queries or prepared statements in the /admin/delete_s5.php script to prevent SQL Injection. 2) Restricting access to the /admin directory via network-level controls such as VPNs or IP whitelisting to limit exposure. 3) Employing Web Application Firewalls (WAFs) configured to detect and block SQL Injection attempts targeting the vulnerable parameter. 4) Conducting thorough code audits and penetration testing to identify and remediate similar injection flaws. 5) Monitoring logs for suspicious database queries or unusual access patterns to detect exploitation attempts early. 6) If possible, upgrading to a newer, patched version of the software once available. These steps go beyond generic advice by focusing on immediate protective measures and code-level remediation specific to the vulnerable component.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-07-26T15:46:19.999Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6886e4c8ad5a09ad00796c70
Added to database: 7/28/2025, 2:47:36 AM
Last enriched: 7/28/2025, 3:02:51 AM
Last updated: 8/30/2025, 1:19:09 PM
Views: 23
Related Threats
CVE-2025-47696: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in Solwin Blog Designer PRO
HighCVE-2025-31100: CWE-434 Unrestricted Upload of File with Dangerous Type in Mojoomla School Management
CriticalCVE-2025-9715: Cross Site Scripting in O2OA
MediumCVE-2025-23366: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
MediumCVE-2025-6992
UnknownActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.