Skip to main content

CVE-2025-9666: SQL Injection in code-projects Simple Grading System

Medium
VulnerabilityCVE-2025-9666cvecve-2025-9666
Published: Fri Aug 29 2025 (08/29/2025, 18:02:09 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Simple Grading System

Description

A security vulnerability has been detected in code-projects Simple Grading System 1.0. Affected by this issue is some unknown functionality of the file /delete_student.php of the component Admin Panel. Such manipulation of the argument ID leads to sql injection. The attack can be launched remotely. The exploit has been disclosed publicly and may be used.

AI-Powered Analysis

AILast updated: 08/29/2025, 18:32:46 UTC

Technical Analysis

CVE-2025-9666 is a SQL Injection vulnerability identified in version 1.0 of the code-projects Simple Grading System, specifically within the /delete_student.php file of the Admin Panel component. The vulnerability arises from improper sanitization or validation of the 'ID' parameter, which is used in SQL queries to delete student records. An attacker can remotely manipulate this parameter to inject malicious SQL code, potentially allowing unauthorized access to the underlying database. This can lead to unauthorized data disclosure, modification, or deletion of records. The vulnerability does not require user interaction or authentication, making it easier to exploit remotely. The CVSS 4.0 base score is 5.3 (medium severity), reflecting a network attack vector with low complexity and no privileges or user interaction required. The impact on confidentiality, integrity, and availability is limited but present, as the vulnerability allows partial control over database operations. No patches or fixes have been published yet, and while no known exploits are currently observed in the wild, the public disclosure of the exploit increases the risk of exploitation.

Potential Impact

For European organizations using the Simple Grading System 1.0, this vulnerability poses a risk to the confidentiality and integrity of student data and administrative records. Exploitation could lead to unauthorized deletion or alteration of student information, disrupting academic operations and potentially violating data protection regulations such as GDPR. The ability to remotely exploit the vulnerability without authentication increases the threat level, especially for educational institutions with exposed or poorly secured admin panels. Data breaches could result in reputational damage, regulatory fines, and operational downtime. Additionally, attackers might leverage this vulnerability as a foothold to escalate privileges or move laterally within the network, depending on the system's integration with other services.

Mitigation Recommendations

Immediate mitigation should focus on restricting access to the /delete_student.php endpoint by implementing network-level controls such as IP whitelisting or VPN access for administrative functions. Input validation and parameterized queries must be implemented to sanitize the 'ID' parameter, preventing SQL injection. Since no official patch is available, organizations should conduct code reviews and apply manual fixes to the affected code. Employing Web Application Firewalls (WAFs) with SQL injection detection rules can provide temporary protection. Regular monitoring of logs for suspicious activity targeting the admin panel is advised. Additionally, organizations should ensure that backups of student data are current and tested for restoration to mitigate potential data loss from exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-29T07:30:31.893Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68b1eecfad5a09ad007a1e46

Added to database: 8/29/2025, 6:17:51 PM

Last enriched: 8/29/2025, 6:32:46 PM

Last updated: 8/29/2025, 7:58:48 PM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats