CVE-2025-8326: SQL Injection in code-projects Exam Form Submission
A vulnerability classified as critical has been found in code-projects Exam Form Submission 1.0. Affected is an unknown function of the file /admin/delete_s7.php. The manipulation of the argument ID leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-8326 is a SQL Injection vulnerability identified in version 1.0 of the code-projects Exam Form Submission application, specifically within the /admin/delete_s7.php script. The vulnerability arises from improper sanitization or validation of the 'ID' parameter, which is directly used in SQL queries. This flaw allows an unauthenticated remote attacker to inject malicious SQL code, potentially manipulating the backend database. Exploitation could lead to unauthorized data access, data modification, or deletion, compromising the confidentiality, integrity, and availability of the application’s data. The vulnerability is remotely exploitable without requiring authentication or user interaction, increasing its risk profile. Although the CVSS v4.0 score is 6.9 (medium severity), the critical classification in the description suggests the potential for significant impact depending on the database and environment. No official patches or mitigations have been published yet, and while no known exploits are currently active in the wild, public disclosure of the exploit code increases the likelihood of exploitation attempts.
Potential Impact
For European organizations using the code-projects Exam Form Submission 1.0 software, this vulnerability poses a substantial risk. Exploitation could lead to unauthorized access to sensitive examination data, student records, or administrative information, potentially violating data protection regulations such as GDPR. Data integrity could be compromised by unauthorized deletion or alteration of records, disrupting academic processes. Availability may also be affected if attackers delete or corrupt critical data, causing operational downtime. The remote, unauthenticated nature of the exploit increases the risk of automated attacks targeting exposed systems. Organizations in education sectors or those relying on this software for exam management are particularly vulnerable, with potential reputational damage and legal consequences if data breaches occur.
Mitigation Recommendations
Immediate mitigation should focus on restricting access to the /admin/delete_s7.php endpoint through network-level controls such as IP whitelisting or VPN access to limit exposure. Implement Web Application Firewall (WAF) rules to detect and block SQL injection patterns targeting the 'ID' parameter. Conduct a thorough code review and apply input validation and parameterized queries or prepared statements to eliminate SQL injection vectors. Until an official patch is released, consider disabling or restricting the vulnerable functionality if feasible. Regularly monitor logs for suspicious activity related to this endpoint. Additionally, ensure database user permissions follow the principle of least privilege to minimize potential damage from exploitation. Organizations should prepare incident response plans to quickly address potential breaches stemming from this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-8326: SQL Injection in code-projects Exam Form Submission
Description
A vulnerability classified as critical has been found in code-projects Exam Form Submission 1.0. Affected is an unknown function of the file /admin/delete_s7.php. The manipulation of the argument ID leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-8326 is a SQL Injection vulnerability identified in version 1.0 of the code-projects Exam Form Submission application, specifically within the /admin/delete_s7.php script. The vulnerability arises from improper sanitization or validation of the 'ID' parameter, which is directly used in SQL queries. This flaw allows an unauthenticated remote attacker to inject malicious SQL code, potentially manipulating the backend database. Exploitation could lead to unauthorized data access, data modification, or deletion, compromising the confidentiality, integrity, and availability of the application’s data. The vulnerability is remotely exploitable without requiring authentication or user interaction, increasing its risk profile. Although the CVSS v4.0 score is 6.9 (medium severity), the critical classification in the description suggests the potential for significant impact depending on the database and environment. No official patches or mitigations have been published yet, and while no known exploits are currently active in the wild, public disclosure of the exploit code increases the likelihood of exploitation attempts.
Potential Impact
For European organizations using the code-projects Exam Form Submission 1.0 software, this vulnerability poses a substantial risk. Exploitation could lead to unauthorized access to sensitive examination data, student records, or administrative information, potentially violating data protection regulations such as GDPR. Data integrity could be compromised by unauthorized deletion or alteration of records, disrupting academic processes. Availability may also be affected if attackers delete or corrupt critical data, causing operational downtime. The remote, unauthenticated nature of the exploit increases the risk of automated attacks targeting exposed systems. Organizations in education sectors or those relying on this software for exam management are particularly vulnerable, with potential reputational damage and legal consequences if data breaches occur.
Mitigation Recommendations
Immediate mitigation should focus on restricting access to the /admin/delete_s7.php endpoint through network-level controls such as IP whitelisting or VPN access to limit exposure. Implement Web Application Firewall (WAF) rules to detect and block SQL injection patterns targeting the 'ID' parameter. Conduct a thorough code review and apply input validation and parameterized queries or prepared statements to eliminate SQL injection vectors. Until an official patch is released, consider disabling or restricting the vulnerable functionality if feasible. Regularly monitor logs for suspicious activity related to this endpoint. Additionally, ensure database user permissions follow the principle of least privilege to minimize potential damage from exploitation. Organizations should prepare incident response plans to quickly address potential breaches stemming from this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-07-30T08:08:13.194Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 688a1b7cad5a09ad00a5b343
Added to database: 7/30/2025, 1:17:48 PM
Last enriched: 7/30/2025, 1:32:43 PM
Last updated: 7/31/2025, 6:16:00 AM
Views: 7
Related Threats
CVE-2025-8375: SQL Injection in code-projects Vehicle Management
MediumCVE-2025-8374: SQL Injection in code-projects Vehicle Management
MediumCVE-2025-24854: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Apache Software Foundation Apache JSPWiki
HighCVE-2025-24853: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Apache Software Foundation Apache JSPWiki
HighCVE-2025-8192: CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition in Android TV
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.