Skip to main content

CVE-2025-8326: SQL Injection in code-projects Exam Form Submission

Medium
VulnerabilityCVE-2025-8326cvecve-2025-8326
Published: Wed Jul 30 2025 (07/30/2025, 13:02:05 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Exam Form Submission

Description

A vulnerability classified as critical has been found in code-projects Exam Form Submission 1.0. Affected is an unknown function of the file /admin/delete_s7.php. The manipulation of the argument ID leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/30/2025, 13:32:43 UTC

Technical Analysis

CVE-2025-8326 is a SQL Injection vulnerability identified in version 1.0 of the code-projects Exam Form Submission application, specifically within the /admin/delete_s7.php script. The vulnerability arises from improper sanitization or validation of the 'ID' parameter, which is directly used in SQL queries. This flaw allows an unauthenticated remote attacker to inject malicious SQL code, potentially manipulating the backend database. Exploitation could lead to unauthorized data access, data modification, or deletion, compromising the confidentiality, integrity, and availability of the application’s data. The vulnerability is remotely exploitable without requiring authentication or user interaction, increasing its risk profile. Although the CVSS v4.0 score is 6.9 (medium severity), the critical classification in the description suggests the potential for significant impact depending on the database and environment. No official patches or mitigations have been published yet, and while no known exploits are currently active in the wild, public disclosure of the exploit code increases the likelihood of exploitation attempts.

Potential Impact

For European organizations using the code-projects Exam Form Submission 1.0 software, this vulnerability poses a substantial risk. Exploitation could lead to unauthorized access to sensitive examination data, student records, or administrative information, potentially violating data protection regulations such as GDPR. Data integrity could be compromised by unauthorized deletion or alteration of records, disrupting academic processes. Availability may also be affected if attackers delete or corrupt critical data, causing operational downtime. The remote, unauthenticated nature of the exploit increases the risk of automated attacks targeting exposed systems. Organizations in education sectors or those relying on this software for exam management are particularly vulnerable, with potential reputational damage and legal consequences if data breaches occur.

Mitigation Recommendations

Immediate mitigation should focus on restricting access to the /admin/delete_s7.php endpoint through network-level controls such as IP whitelisting or VPN access to limit exposure. Implement Web Application Firewall (WAF) rules to detect and block SQL injection patterns targeting the 'ID' parameter. Conduct a thorough code review and apply input validation and parameterized queries or prepared statements to eliminate SQL injection vectors. Until an official patch is released, consider disabling or restricting the vulnerable functionality if feasible. Regularly monitor logs for suspicious activity related to this endpoint. Additionally, ensure database user permissions follow the principle of least privilege to minimize potential damage from exploitation. Organizations should prepare incident response plans to quickly address potential breaches stemming from this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-30T08:08:13.194Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 688a1b7cad5a09ad00a5b343

Added to database: 7/30/2025, 1:17:48 PM

Last enriched: 7/30/2025, 1:32:43 PM

Last updated: 7/31/2025, 6:16:00 AM

Views: 7

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats