CVE-2025-8338: SQL Injection in projectworlds Online Admission System
A vulnerability was found in projectworlds Online Admission System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /adminac.php. The manipulation of the argument ID leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-8338 is a SQL Injection vulnerability identified in version 1.0 of the projectworlds Online Admission System, specifically within the /adminac.php file. The vulnerability arises from improper sanitization or validation of the 'ID' parameter, which can be manipulated by an attacker to inject malicious SQL code. This injection flaw allows an unauthenticated remote attacker to execute arbitrary SQL queries against the backend database. The vulnerability does not require any user interaction or privileges, making it remotely exploitable over the network. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the ease of exploitation (no authentication, low attack complexity) but limited impact on confidentiality, integrity, and availability (each rated low). The vulnerability affects only version 1.0 of the product, and no official patches or fixes have been published yet. Although no known exploits are currently observed in the wild, the public disclosure of the exploit code increases the risk of exploitation. SQL Injection vulnerabilities can lead to unauthorized data access, data modification, or even complete compromise of the underlying database, depending on the database permissions and configuration. Given the nature of the affected system—an online admission platform—successful exploitation could expose sensitive personal data of applicants, disrupt admission processes, or allow attackers to escalate privileges within the system.
Potential Impact
For European organizations using the projectworlds Online Admission System 1.0, this vulnerability poses a significant risk to the confidentiality and integrity of applicant data, including personal identifiable information (PII). Educational institutions and admission offices relying on this system could face data breaches, leading to regulatory non-compliance under GDPR, reputational damage, and potential financial penalties. The availability of the admission system could also be impacted if attackers leverage the SQL Injection to corrupt or delete critical data, disrupting admission workflows. Since the vulnerability is remotely exploitable without authentication, attackers from anywhere could target these systems, increasing the threat landscape. The impact is particularly critical for institutions handling large volumes of sensitive data or those with limited cybersecurity defenses. Additionally, the lack of patches means organizations must rely on mitigation strategies until an official fix is released.
Mitigation Recommendations
Given the absence of an official patch, European organizations should implement immediate compensating controls. First, apply strict input validation and sanitization on the 'ID' parameter at the web application firewall (WAF) or reverse proxy level to block malicious SQL payloads. Deploy WAF rules specifically designed to detect and prevent SQL Injection attempts targeting /adminac.php. Restrict network access to the administration interface to trusted IP addresses or VPN-only access to reduce exposure. Conduct thorough code reviews and consider temporary disabling or restricting access to the vulnerable functionality if feasible. Monitor logs for unusual database queries or error messages indicative of injection attempts. Organizations should also plan for prompt upgrade or patching once a vendor fix becomes available. Regular backups of the database should be maintained to enable recovery in case of data corruption or deletion. Finally, educate administrators and developers about secure coding practices to prevent similar vulnerabilities in future versions.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-8338: SQL Injection in projectworlds Online Admission System
Description
A vulnerability was found in projectworlds Online Admission System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /adminac.php. The manipulation of the argument ID leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-8338 is a SQL Injection vulnerability identified in version 1.0 of the projectworlds Online Admission System, specifically within the /adminac.php file. The vulnerability arises from improper sanitization or validation of the 'ID' parameter, which can be manipulated by an attacker to inject malicious SQL code. This injection flaw allows an unauthenticated remote attacker to execute arbitrary SQL queries against the backend database. The vulnerability does not require any user interaction or privileges, making it remotely exploitable over the network. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the ease of exploitation (no authentication, low attack complexity) but limited impact on confidentiality, integrity, and availability (each rated low). The vulnerability affects only version 1.0 of the product, and no official patches or fixes have been published yet. Although no known exploits are currently observed in the wild, the public disclosure of the exploit code increases the risk of exploitation. SQL Injection vulnerabilities can lead to unauthorized data access, data modification, or even complete compromise of the underlying database, depending on the database permissions and configuration. Given the nature of the affected system—an online admission platform—successful exploitation could expose sensitive personal data of applicants, disrupt admission processes, or allow attackers to escalate privileges within the system.
Potential Impact
For European organizations using the projectworlds Online Admission System 1.0, this vulnerability poses a significant risk to the confidentiality and integrity of applicant data, including personal identifiable information (PII). Educational institutions and admission offices relying on this system could face data breaches, leading to regulatory non-compliance under GDPR, reputational damage, and potential financial penalties. The availability of the admission system could also be impacted if attackers leverage the SQL Injection to corrupt or delete critical data, disrupting admission workflows. Since the vulnerability is remotely exploitable without authentication, attackers from anywhere could target these systems, increasing the threat landscape. The impact is particularly critical for institutions handling large volumes of sensitive data or those with limited cybersecurity defenses. Additionally, the lack of patches means organizations must rely on mitigation strategies until an official fix is released.
Mitigation Recommendations
Given the absence of an official patch, European organizations should implement immediate compensating controls. First, apply strict input validation and sanitization on the 'ID' parameter at the web application firewall (WAF) or reverse proxy level to block malicious SQL payloads. Deploy WAF rules specifically designed to detect and prevent SQL Injection attempts targeting /adminac.php. Restrict network access to the administration interface to trusted IP addresses or VPN-only access to reduce exposure. Conduct thorough code reviews and consider temporary disabling or restricting access to the vulnerable functionality if feasible. Monitor logs for unusual database queries or error messages indicative of injection attempts. Organizations should also plan for prompt upgrade or patching once a vendor fix becomes available. Regular backups of the database should be maintained to enable recovery in case of data corruption or deletion. Finally, educate administrators and developers about secure coding practices to prevent similar vulnerabilities in future versions.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-07-30T08:34:20.404Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 688aaf24ad5a09ad00b0c3ac
Added to database: 7/30/2025, 11:47:48 PM
Last enriched: 8/7/2025, 1:29:00 AM
Last updated: 10/30/2025, 3:59:52 PM
Views: 64
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12516: CWE-394 Unexpected Status Code or Return Value in Azure Access Technology BLU-IC2
CriticalCVE-2025-12515: CWE-394 Unexpected Status Code or Return Value in Azure Access Technology BLU-IC2
CriticalCVE-2025-61117: n/a
UnknownCVE-2025-12517: CWE-448 Obsolete Feature in UI in Azure Access Technology BLU-IC2
LowCVE-2025-61116: n/a
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.