Skip to main content

CVE-2025-8273: SQL Injection in code-projects Exam Form Submission

Medium
VulnerabilityCVE-2025-8273cvecve-2025-8273
Published: Mon Jul 28 2025 (07/28/2025, 11:02:05 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Exam Form Submission

Description

A vulnerability classified as critical has been found in code-projects Exam Form Submission 1.0. Affected is an unknown function of the file /admin/update_s8.php. The manipulation of the argument credits leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/28/2025, 11:32:50 UTC

Technical Analysis

CVE-2025-8273 is a SQL Injection vulnerability identified in the code-projects Exam Form Submission version 1.0, specifically within an unknown function in the /admin/update_s8.php file. The vulnerability arises from improper sanitization or validation of the 'credits' parameter, which allows an attacker to inject malicious SQL code remotely without requiring authentication or user interaction. This flaw enables attackers to manipulate backend database queries, potentially leading to unauthorized data access, data modification, or deletion. The vulnerability has a CVSS 4.0 base score of 6.9, categorized as medium severity, reflecting its network attack vector, low complexity, and no required privileges or user interaction. However, the impact on confidentiality, integrity, and availability is rated as low, indicating limited but non-negligible consequences. Although no public exploits are currently known in the wild, the vulnerability has been publicly disclosed, increasing the risk of exploitation. The lack of available patches or mitigation guidance from the vendor further elevates the threat. The vulnerability affects only version 1.0 of the Exam Form Submission product, which is a specialized web application likely used by educational institutions or organizations managing exam-related data.

Potential Impact

For European organizations, especially educational institutions or administrative bodies using the code-projects Exam Form Submission 1.0, this vulnerability poses a risk of unauthorized access to sensitive exam data, student records, or administrative information. Exploitation could lead to data breaches compromising confidentiality, unauthorized data manipulation affecting integrity, or disruption of service availability. Such incidents could result in reputational damage, regulatory penalties under GDPR due to exposure of personal data, and operational disruptions. Given the remote exploitability without authentication, attackers could leverage this vulnerability to gain foothold in internal networks or pivot to other systems. The medium severity rating suggests that while the vulnerability is serious, the overall impact might be limited by the scope of the affected product and its deployment scale. Nonetheless, organizations relying on this software should treat the threat seriously to prevent potential data breaches and maintain compliance with European data protection regulations.

Mitigation Recommendations

Organizations should immediately conduct an inventory to identify any deployments of code-projects Exam Form Submission version 1.0. In the absence of vendor patches, implement the following mitigations: 1) Apply Web Application Firewall (WAF) rules specifically designed to detect and block SQL injection attempts targeting the 'credits' parameter in /admin/update_s8.php. 2) Employ input validation and sanitization at the application or proxy level to reject suspicious inputs. 3) Restrict access to the /admin directory using network segmentation, IP whitelisting, or VPN access to limit exposure. 4) Monitor logs for unusual database query patterns or repeated access attempts to the vulnerable endpoint. 5) If feasible, upgrade or migrate to a newer, patched version of the software or alternative solutions. 6) Conduct regular security assessments and penetration testing focusing on injection vulnerabilities. 7) Educate administrators and developers about secure coding practices to prevent similar issues in custom or legacy applications.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-27T18:31:42.240Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68875c52ad5a09ad008291ab

Added to database: 7/28/2025, 11:17:38 AM

Last enriched: 7/28/2025, 11:32:50 AM

Last updated: 7/30/2025, 9:13:12 AM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats