Skip to main content

CVE-2025-9610: SQL Injection in code-projects Online Event Judging System

Medium
VulnerabilityCVE-2025-9610cvecve-2025-9610
Published: Fri Aug 29 2025 (08/29/2025, 03:32:08 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Online Event Judging System

Description

A vulnerability was determined in code-projects Online Event Judging System 1.0. This issue affects some unknown processing of the file /create_account.php. This manipulation of the argument fname causes sql injection. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized. Other parameters might be affected as well.

AI-Powered Analysis

AILast updated: 08/29/2025, 04:03:47 UTC

Technical Analysis

CVE-2025-9610 is a SQL Injection vulnerability identified in version 1.0 of the code-projects Online Event Judging System, specifically in the /create_account.php file. The vulnerability arises from improper sanitization or validation of the 'fname' parameter, which allows an attacker to inject malicious SQL code remotely without requiring authentication or user interaction. This flaw could potentially allow an attacker to manipulate backend database queries, leading to unauthorized data access, data modification, or even deletion. The vulnerability is rated with a CVSS 4.0 base score of 6.9 (medium severity), reflecting the ease of remote exploitation (no privileges or user interaction required) but with limited impact on confidentiality, integrity, and availability (all rated low). While the exploit has been publicly disclosed, there are no known active exploits in the wild at this time. Other parameters in the same or related scripts might also be vulnerable, indicating a broader issue with input validation in the application. The absence of available patches or mitigations from the vendor increases the urgency for organizations using this system to implement compensating controls. Given the nature of the Online Event Judging System, which likely stores sensitive participant and event data, exploitation could lead to exposure of personal information or manipulation of event results, undermining trust and operational integrity.

Potential Impact

For European organizations using the code-projects Online Event Judging System, this vulnerability poses a risk of unauthorized access to sensitive data such as participant identities, judging scores, and event outcomes. This could lead to data breaches violating GDPR regulations, resulting in legal penalties and reputational damage. Manipulation of judging data could also affect the fairness and credibility of events, impacting organizations that rely on these systems for competitions, academic assessments, or public events. The remote, unauthenticated nature of the exploit increases the risk of widespread attacks, especially if the system is exposed to the internet without adequate network protections. Additionally, the potential for data integrity compromise could disrupt event operations and require costly incident response and remediation efforts. Although no active exploits are currently known, the public disclosure of the vulnerability means attackers could develop exploits rapidly, increasing the threat landscape for European entities.

Mitigation Recommendations

1. Immediate implementation of Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the /create_account.php endpoint and the 'fname' parameter. 2. Conduct a thorough code review and input validation audit of the Online Event Judging System, focusing on all user-supplied inputs, to identify and remediate additional injection points. 3. Employ parameterized queries or prepared statements in the application code to prevent SQL injection. 4. Restrict direct internet access to the Online Event Judging System by placing it behind VPNs or internal networks where possible. 5. Monitor database logs and application logs for suspicious queries or anomalies indicative of injection attempts. 6. Engage with the vendor or development team to obtain or develop patches addressing the vulnerability. 7. Implement strict least-privilege database user permissions to limit the impact of any successful injection. 8. Educate system administrators and developers on secure coding practices and the importance of input sanitization. 9. Regularly update and patch all related software components and dependencies to reduce attack surface. 10. Prepare an incident response plan specific to web application attacks to enable rapid containment if exploitation occurs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-28T15:31:47.980Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68b122e4ad5a09ad0073d171

Added to database: 8/29/2025, 3:47:48 AM

Last enriched: 8/29/2025, 4:03:47 AM

Last updated: 8/29/2025, 5:30:18 AM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats