Skip to main content

CVE-2025-8271: SQL Injection in code-projects Exam Form Submission

Medium
VulnerabilityCVE-2025-8271cvecve-2025-8271
Published: Mon Jul 28 2025 (07/28/2025, 10:02:05 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Exam Form Submission

Description

A vulnerability was found in code-projects Exam Form Submission 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /admin/delete_s3.php. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/28/2025, 10:32:40 UTC

Technical Analysis

CVE-2025-8271 is a SQL Injection vulnerability identified in version 1.0 of the code-projects Exam Form Submission application. The vulnerability exists in the /admin/delete_s3.php file, specifically through the manipulation of the 'ID' parameter. An attacker can remotely exploit this flaw without requiring authentication or user interaction, by sending specially crafted requests that inject malicious SQL code into the backend database queries. This can lead to unauthorized data access, modification, or deletion, potentially compromising the confidentiality, integrity, and availability of the affected system's data. The vulnerability has been publicly disclosed, increasing the risk of exploitation, although no confirmed exploits are currently observed in the wild. The CVSS 4.0 base score is 6.9, indicating a medium severity level, reflecting the ease of remote exploitation without privileges but limited scope and impact compared to higher severity vulnerabilities. The vulnerability does not require user interaction or privileges, and the attack vector is network-based, making it accessible to remote attackers. The impact on the victim system depends on the database's role and the sensitivity of the data managed by the Exam Form Submission application. Since the vulnerability affects an administrative script, successful exploitation could allow attackers to delete or manipulate critical data, disrupt exam form processing, or gain further access to the backend systems if combined with other vulnerabilities.

Potential Impact

For European organizations using the code-projects Exam Form Submission 1.0 application, this vulnerability poses a significant risk to the integrity and availability of exam-related data. Educational institutions or certification bodies relying on this software could face data breaches, unauthorized data manipulation, or service disruption. This could lead to loss of trust, regulatory non-compliance (especially under GDPR if personal data is involved), and operational downtime during remediation. The ability to exploit the vulnerability remotely without authentication increases the attack surface, potentially allowing attackers from anywhere to target vulnerable systems. Given the critical nature of exam data, any compromise could have reputational and legal consequences. Additionally, if the compromised system is integrated with other internal networks, attackers might pivot to other sensitive systems, amplifying the impact.

Mitigation Recommendations

1. Immediate application of patches or updates from the vendor once available is critical; since no patch links are currently provided, organizations should monitor vendor communications closely. 2. Implement Web Application Firewalls (WAFs) with rules to detect and block SQL injection attempts targeting the 'ID' parameter in /admin/delete_s3.php. 3. Restrict access to the /admin directory by IP whitelisting or VPN-only access to reduce exposure. 4. Conduct thorough input validation and parameterized queries or prepared statements in the application code to prevent SQL injection. 5. Regularly audit and monitor database logs for suspicious queries or anomalies related to the vulnerable endpoint. 6. If immediate patching is not possible, consider disabling or restricting the vulnerable functionality temporarily. 7. Educate administrators and security teams about this vulnerability to ensure rapid detection and response to potential exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-27T18:31:33.299Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68874e41ad5a09ad00823ed0

Added to database: 7/28/2025, 10:17:37 AM

Last enriched: 7/28/2025, 10:32:40 AM

Last updated: 7/30/2025, 7:38:18 AM

Views: 6

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats