CVE-2025-9665: SQL Injection in code-projects Simple Grading System
A weakness has been identified in code-projects Simple Grading System 1.0. Affected by this vulnerability is an unknown functionality of the file /edit_student.php of the component Admin Panel. This manipulation of the argument ID causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.
AI Analysis
Technical Summary
CVE-2025-9665 is a medium-severity SQL Injection vulnerability identified in version 1.0 of the code-projects Simple Grading System, specifically within the Admin Panel component's /edit_student.php file. The vulnerability arises from improper sanitization or validation of the 'ID' parameter, which is manipulated to inject malicious SQL code. This flaw allows an unauthenticated remote attacker to execute arbitrary SQL commands on the backend database. The vulnerability does not require user interaction and can be exploited remotely without prior authentication, increasing its risk profile. The CVSS 4.0 base score is 5.3, reflecting a medium severity due to the limited scope of impact and the requirement of low privileges (PR:L) but no user interaction or authentication. The vulnerability impacts confidentiality, integrity, and availability to a limited extent (VC:L, VI:L, VA:L), indicating that an attacker could potentially read or modify some data and cause partial disruption but not full system compromise. No patches or fixes have been published yet, and while the exploit code is publicly available, there are no known active exploits in the wild at this time. The vulnerability affects only version 1.0 of the Simple Grading System, a product used for managing grading data, likely deployed in educational institutions or administrative environments. The attack vector is network-based (AV:N), making it accessible to attackers over the internet or internal networks where the system is reachable.
Potential Impact
For European organizations, particularly educational institutions or administrative bodies using the Simple Grading System 1.0, this vulnerability poses a risk of unauthorized data access and modification. Attackers exploiting this SQL Injection could extract sensitive student information, alter grading records, or disrupt system availability, undermining data integrity and trust in academic processes. The breach of confidentiality could lead to privacy violations under GDPR, resulting in regulatory penalties and reputational damage. Although the vulnerability requires low privileges, the lack of authentication requirement means attackers can attempt exploitation remotely, increasing exposure. The impact is more pronounced in organizations that have not implemented compensating controls such as web application firewalls or network segmentation. Additionally, the absence of a patch means organizations must rely on mitigation strategies to reduce risk until an official fix is released.
Mitigation Recommendations
1. Immediate implementation of input validation and parameterized queries or prepared statements in the /edit_student.php file to prevent SQL Injection. 2. Deploy Web Application Firewalls (WAFs) with rules specifically targeting SQL Injection patterns to block malicious requests targeting the 'ID' parameter. 3. Restrict network access to the Admin Panel by limiting IP ranges and enforcing VPN or zero-trust access models to reduce exposure. 4. Conduct thorough code audits and penetration testing on the Simple Grading System to identify and remediate similar injection points. 5. Monitor logs for unusual database query patterns or repeated failed attempts to manipulate the 'ID' parameter. 6. Plan and prioritize upgrading or patching the Simple Grading System once a vendor fix becomes available. 7. Educate system administrators on the risks and signs of SQL Injection attacks to enable rapid detection and response.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-9665: SQL Injection in code-projects Simple Grading System
Description
A weakness has been identified in code-projects Simple Grading System 1.0. Affected by this vulnerability is an unknown functionality of the file /edit_student.php of the component Admin Panel. This manipulation of the argument ID causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.
AI-Powered Analysis
Technical Analysis
CVE-2025-9665 is a medium-severity SQL Injection vulnerability identified in version 1.0 of the code-projects Simple Grading System, specifically within the Admin Panel component's /edit_student.php file. The vulnerability arises from improper sanitization or validation of the 'ID' parameter, which is manipulated to inject malicious SQL code. This flaw allows an unauthenticated remote attacker to execute arbitrary SQL commands on the backend database. The vulnerability does not require user interaction and can be exploited remotely without prior authentication, increasing its risk profile. The CVSS 4.0 base score is 5.3, reflecting a medium severity due to the limited scope of impact and the requirement of low privileges (PR:L) but no user interaction or authentication. The vulnerability impacts confidentiality, integrity, and availability to a limited extent (VC:L, VI:L, VA:L), indicating that an attacker could potentially read or modify some data and cause partial disruption but not full system compromise. No patches or fixes have been published yet, and while the exploit code is publicly available, there are no known active exploits in the wild at this time. The vulnerability affects only version 1.0 of the Simple Grading System, a product used for managing grading data, likely deployed in educational institutions or administrative environments. The attack vector is network-based (AV:N), making it accessible to attackers over the internet or internal networks where the system is reachable.
Potential Impact
For European organizations, particularly educational institutions or administrative bodies using the Simple Grading System 1.0, this vulnerability poses a risk of unauthorized data access and modification. Attackers exploiting this SQL Injection could extract sensitive student information, alter grading records, or disrupt system availability, undermining data integrity and trust in academic processes. The breach of confidentiality could lead to privacy violations under GDPR, resulting in regulatory penalties and reputational damage. Although the vulnerability requires low privileges, the lack of authentication requirement means attackers can attempt exploitation remotely, increasing exposure. The impact is more pronounced in organizations that have not implemented compensating controls such as web application firewalls or network segmentation. Additionally, the absence of a patch means organizations must rely on mitigation strategies to reduce risk until an official fix is released.
Mitigation Recommendations
1. Immediate implementation of input validation and parameterized queries or prepared statements in the /edit_student.php file to prevent SQL Injection. 2. Deploy Web Application Firewalls (WAFs) with rules specifically targeting SQL Injection patterns to block malicious requests targeting the 'ID' parameter. 3. Restrict network access to the Admin Panel by limiting IP ranges and enforcing VPN or zero-trust access models to reduce exposure. 4. Conduct thorough code audits and penetration testing on the Simple Grading System to identify and remediate similar injection points. 5. Monitor logs for unusual database query patterns or repeated failed attempts to manipulate the 'ID' parameter. 6. Plan and prioritize upgrading or patching the Simple Grading System once a vendor fix becomes available. 7. Educate system administrators on the risks and signs of SQL Injection attacks to enable rapid detection and response.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-29T07:30:29.056Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68b1eecfad5a09ad007a1e3f
Added to database: 8/29/2025, 6:17:51 PM
Last enriched: 8/29/2025, 6:32:55 PM
Last updated: 8/30/2025, 12:34:20 AM
Views: 6
Related Threats
CVE-2025-34165: CWE-121 Stack-based Buffer Overflow in NetSupport Ltd. NetSupport Manager
HighCVE-2025-34164: CWE-122 Heap-based Buffer Overflow in NetSupport Ltd. NetSupport Manager
HighCVE-2025-58159: CWE-434: Unrestricted Upload of File with Dangerous Type in LabRedesCefetRJ WeGIA
CriticalCVE-2025-57752: CWE-524: Use of Cache Containing Sensitive Information in vercel next.js
MediumCVE-2025-55173: CWE-20: Improper Input Validation in vercel next.js
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.