CVE-2025-9666: SQL Injection in code-projects Simple Grading System
A security vulnerability has been detected in code-projects Simple Grading System 1.0. Affected by this issue is some unknown functionality of the file /delete_student.php of the component Admin Panel. Such manipulation of the argument ID leads to sql injection. The attack can be launched remotely. The exploit has been disclosed publicly and may be used.
AI Analysis
Technical Summary
CVE-2025-9666 is a SQL Injection vulnerability identified in version 1.0 of the code-projects Simple Grading System, specifically within the /delete_student.php file of the Admin Panel component. The vulnerability arises from improper sanitization or validation of the 'ID' parameter, which is used in SQL queries to delete student records. An attacker can remotely manipulate this parameter to inject malicious SQL code, potentially allowing unauthorized access to the underlying database. This can lead to unauthorized data disclosure, modification, or deletion of records. The vulnerability does not require user interaction or authentication, making it easier to exploit remotely. The CVSS 4.0 base score is 5.3 (medium severity), reflecting a network attack vector with low complexity and no privileges or user interaction required. The impact on confidentiality, integrity, and availability is limited but present, as the vulnerability allows partial control over database operations. No patches or fixes have been published yet, and while no known exploits are currently observed in the wild, the public disclosure of the exploit increases the risk of exploitation.
Potential Impact
For European organizations using the Simple Grading System 1.0, this vulnerability poses a risk to the confidentiality and integrity of student data and administrative records. Exploitation could lead to unauthorized deletion or alteration of student information, disrupting academic operations and potentially violating data protection regulations such as GDPR. The ability to remotely exploit the vulnerability without authentication increases the threat level, especially for educational institutions with exposed or poorly secured admin panels. Data breaches could result in reputational damage, regulatory fines, and operational downtime. Additionally, attackers might leverage this vulnerability as a foothold to escalate privileges or move laterally within the network, depending on the system's integration with other services.
Mitigation Recommendations
Immediate mitigation should focus on restricting access to the /delete_student.php endpoint by implementing network-level controls such as IP whitelisting or VPN access for administrative functions. Input validation and parameterized queries must be implemented to sanitize the 'ID' parameter, preventing SQL injection. Since no official patch is available, organizations should conduct code reviews and apply manual fixes to the affected code. Employing Web Application Firewalls (WAFs) with SQL injection detection rules can provide temporary protection. Regular monitoring of logs for suspicious activity targeting the admin panel is advised. Additionally, organizations should ensure that backups of student data are current and tested for restoration to mitigate potential data loss from exploitation.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-9666: SQL Injection in code-projects Simple Grading System
Description
A security vulnerability has been detected in code-projects Simple Grading System 1.0. Affected by this issue is some unknown functionality of the file /delete_student.php of the component Admin Panel. Such manipulation of the argument ID leads to sql injection. The attack can be launched remotely. The exploit has been disclosed publicly and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-9666 is a SQL Injection vulnerability identified in version 1.0 of the code-projects Simple Grading System, specifically within the /delete_student.php file of the Admin Panel component. The vulnerability arises from improper sanitization or validation of the 'ID' parameter, which is used in SQL queries to delete student records. An attacker can remotely manipulate this parameter to inject malicious SQL code, potentially allowing unauthorized access to the underlying database. This can lead to unauthorized data disclosure, modification, or deletion of records. The vulnerability does not require user interaction or authentication, making it easier to exploit remotely. The CVSS 4.0 base score is 5.3 (medium severity), reflecting a network attack vector with low complexity and no privileges or user interaction required. The impact on confidentiality, integrity, and availability is limited but present, as the vulnerability allows partial control over database operations. No patches or fixes have been published yet, and while no known exploits are currently observed in the wild, the public disclosure of the exploit increases the risk of exploitation.
Potential Impact
For European organizations using the Simple Grading System 1.0, this vulnerability poses a risk to the confidentiality and integrity of student data and administrative records. Exploitation could lead to unauthorized deletion or alteration of student information, disrupting academic operations and potentially violating data protection regulations such as GDPR. The ability to remotely exploit the vulnerability without authentication increases the threat level, especially for educational institutions with exposed or poorly secured admin panels. Data breaches could result in reputational damage, regulatory fines, and operational downtime. Additionally, attackers might leverage this vulnerability as a foothold to escalate privileges or move laterally within the network, depending on the system's integration with other services.
Mitigation Recommendations
Immediate mitigation should focus on restricting access to the /delete_student.php endpoint by implementing network-level controls such as IP whitelisting or VPN access for administrative functions. Input validation and parameterized queries must be implemented to sanitize the 'ID' parameter, preventing SQL injection. Since no official patch is available, organizations should conduct code reviews and apply manual fixes to the affected code. Employing Web Application Firewalls (WAFs) with SQL injection detection rules can provide temporary protection. Regular monitoring of logs for suspicious activity targeting the admin panel is advised. Additionally, organizations should ensure that backups of student data are current and tested for restoration to mitigate potential data loss from exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-29T07:30:31.893Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68b1eecfad5a09ad007a1e46
Added to database: 8/29/2025, 6:17:51 PM
Last enriched: 8/29/2025, 6:32:46 PM
Last updated: 8/29/2025, 7:58:48 PM
Views: 3
Related Threats
CVE-2025-58066: CWE-406: Insufficient Control of Network Message Volume (Network Amplification) in pendulum-project ntpd-rs
MediumCVE-2025-9675: Improper Export of Android Application Components in Voice Changer App
MediumCVE-2025-9674: Improper Export of Android Application Components in Transbyte Scooper News App
MediumCVE-2025-9673: Improper Export of Android Application Components in Kakao 헤이카카오 Hey Kakao App
MediumCVE-2025-9672: Improper Export of Android Application Components in Rejseplanen App
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.