CVE-2025-8253: SQL Injection in code-projects Exam Form Submission
A vulnerability was found in code-projects Exam Form Submission 1.0. It has been classified as critical. This affects an unknown part of the file /admin/delete_s6.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-8253 is a SQL Injection vulnerability identified in version 1.0 of the code-projects Exam Form Submission application. The vulnerability exists in the /admin/delete_s6.php script, specifically through the manipulation of the 'ID' parameter. This parameter is not properly sanitized or validated, allowing an attacker to inject malicious SQL code. The injection flaw can be exploited remotely without any authentication or user interaction, making it accessible to unauthenticated attackers over the network. The vulnerability could allow attackers to execute arbitrary SQL commands on the backend database, potentially leading to unauthorized data access, data modification, or deletion. Although the CVSS 4.0 base score is 6.9 (medium severity), the impact on confidentiality, integrity, and availability is rated as low individually but combined could be significant depending on the database contents and application context. The vulnerability has been publicly disclosed, increasing the risk of exploitation, but no known exploits in the wild have been reported yet. The absence of a patch or mitigation guidance from the vendor increases the urgency for organizations to implement compensating controls. The vulnerability affects only version 1.0 of the product, which is a niche application used for exam form submissions, likely deployed in educational or administrative environments.
Potential Impact
For European organizations, the impact of this vulnerability depends on the extent to which the Exam Form Submission 1.0 application is used. If deployed, exploitation could lead to unauthorized access to sensitive student or examination data, manipulation or deletion of exam records, and potential disruption of administrative processes. This could result in data breaches violating GDPR regulations, reputational damage, and operational interruptions. The ability to perform SQL injection remotely without authentication increases the risk of automated attacks or exploitation by opportunistic threat actors. Educational institutions and administrative bodies in Europe that rely on this software or similar vulnerable components are at risk. The potential for data integrity compromise could undermine trust in examination processes and lead to legal and compliance consequences. However, the limited scope of the affected product and absence of widespread exploitation reduce the immediate widespread impact across Europe.
Mitigation Recommendations
Since no official patches or updates are currently available, European organizations should implement the following specific mitigations: 1) Immediately restrict access to the /admin/delete_s6.php endpoint by IP whitelisting or network segmentation to limit exposure to trusted administrators only. 2) Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'ID' parameter. 3) Conduct thorough input validation and sanitization on all parameters, especially 'ID', to neutralize malicious inputs. 4) Monitor application logs for suspicious activity related to the vulnerable endpoint and parameter. 5) If feasible, disable or remove the vulnerable functionality until a patch is available. 6) Engage with the vendor or community to obtain or develop patches or updated versions addressing the vulnerability. 7) Educate administrators about the risks and signs of exploitation attempts. These targeted actions go beyond generic advice by focusing on immediate access control, detection, and input handling specific to the vulnerable component.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-8253: SQL Injection in code-projects Exam Form Submission
Description
A vulnerability was found in code-projects Exam Form Submission 1.0. It has been classified as critical. This affects an unknown part of the file /admin/delete_s6.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-8253 is a SQL Injection vulnerability identified in version 1.0 of the code-projects Exam Form Submission application. The vulnerability exists in the /admin/delete_s6.php script, specifically through the manipulation of the 'ID' parameter. This parameter is not properly sanitized or validated, allowing an attacker to inject malicious SQL code. The injection flaw can be exploited remotely without any authentication or user interaction, making it accessible to unauthenticated attackers over the network. The vulnerability could allow attackers to execute arbitrary SQL commands on the backend database, potentially leading to unauthorized data access, data modification, or deletion. Although the CVSS 4.0 base score is 6.9 (medium severity), the impact on confidentiality, integrity, and availability is rated as low individually but combined could be significant depending on the database contents and application context. The vulnerability has been publicly disclosed, increasing the risk of exploitation, but no known exploits in the wild have been reported yet. The absence of a patch or mitigation guidance from the vendor increases the urgency for organizations to implement compensating controls. The vulnerability affects only version 1.0 of the product, which is a niche application used for exam form submissions, likely deployed in educational or administrative environments.
Potential Impact
For European organizations, the impact of this vulnerability depends on the extent to which the Exam Form Submission 1.0 application is used. If deployed, exploitation could lead to unauthorized access to sensitive student or examination data, manipulation or deletion of exam records, and potential disruption of administrative processes. This could result in data breaches violating GDPR regulations, reputational damage, and operational interruptions. The ability to perform SQL injection remotely without authentication increases the risk of automated attacks or exploitation by opportunistic threat actors. Educational institutions and administrative bodies in Europe that rely on this software or similar vulnerable components are at risk. The potential for data integrity compromise could undermine trust in examination processes and lead to legal and compliance consequences. However, the limited scope of the affected product and absence of widespread exploitation reduce the immediate widespread impact across Europe.
Mitigation Recommendations
Since no official patches or updates are currently available, European organizations should implement the following specific mitigations: 1) Immediately restrict access to the /admin/delete_s6.php endpoint by IP whitelisting or network segmentation to limit exposure to trusted administrators only. 2) Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'ID' parameter. 3) Conduct thorough input validation and sanitization on all parameters, especially 'ID', to neutralize malicious inputs. 4) Monitor application logs for suspicious activity related to the vulnerable endpoint and parameter. 5) If feasible, disable or remove the vulnerable functionality until a patch is available. 6) Engage with the vendor or community to obtain or develop patches or updated versions addressing the vulnerability. 7) Educate administrators about the risks and signs of exploitation attempts. These targeted actions go beyond generic advice by focusing on immediate access control, detection, and input handling specific to the vulnerable component.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-07-26T15:46:23.989Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6886e4c8ad5a09ad00796c78
Added to database: 7/28/2025, 2:47:36 AM
Last enriched: 7/28/2025, 3:02:41 AM
Last updated: 8/30/2025, 1:19:25 PM
Views: 29
Related Threats
CVE-2025-9751: SQL Injection in Campcodes Online Learning Management System
MediumCVE-2025-9750: SQL Injection in Campcodes Online Learning Management System
MediumCVE-2025-9749: SQL Injection in HKritesh009 Grocery List Management Web App
MediumCVE-2025-9748: Stack-based Buffer Overflow in Tenda CH22
HighCVE-2025-9747: Cross-Site Request Forgery in Koillection
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.