CVE-2025-5583

| EUVD-2025-16864 HIGH
2025-06-04 [email protected]
7.3
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low

Lifecycle Timeline

4
Analysis Generated
Mar 14, 2026 - 17:29 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 17:29 euvd
EUVD-2025-16864
PoC Detected
Jun 04, 2025 - 17:44 vuln.today
Public exploit code
CVE Published
Jun 04, 2025 - 10:15 nvd
HIGH 7.3

Description

A vulnerability classified as critical has been found in CodeAstro Real Estate Management System 1.0. Affected is an unknown function of the file /register.php. The manipulation leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

Analysis

Critical SQL injection vulnerability in CodeAstro Real Estate Management System version 1.0, specifically in the /register.php file that allows unauthenticated remote attackers to inject arbitrary SQL commands. The vulnerability enables attackers to read, modify, or delete sensitive database information including user credentials, property listings, and financial records. Public exploit code is available and the vulnerability is likely being actively exploited in the wild, making immediate patching essential for all affected installations.

Technical Context

The vulnerability exists in the user registration endpoint (/register.php) of CodeAstro Real Estate Management System 1.0, which fails to properly sanitize or parameterize user-supplied input before incorporating it into SQL queries. This is classified under CWE-74 (Improper Neutralization of Special Elements in Output Used by a Downstream Component), indicating inadequate input validation and output encoding. The root cause is the absence of prepared statements or parameterized queries, allowing attackers to break out of intended SQL syntax context and execute arbitrary database commands. The affected component processes registration data (likely email, username, password fields) without proper escaping, creating a direct SQL injection vector accessible over the network without authentication.

Affected Products

CodeAstro Real Estate Management System version 1.0 (all installations). CPE identifier: cpe:2.3:a:codeastro:real_estate_management_system:1.0:*:*:*:*:*:*:*. The vulnerability affects the complete 1.0 release without version differentiation noted. Any deployment exposing /register.php publicly (standard configuration) is vulnerable. No information provided on whether patch versions (1.1+) exist or vendor advisory links are available.

Remediation

Immediate actions: (1) Disable or restrict access to /register.php if registration is not actively required; (2) Implement Web Application Firewall (WAF) rules to block common SQL injection payloads in registration parameters; (3) Apply input validation requiring email format validation, alphanumeric username restrictions, and length limits on all fields. (4) Upgrade to the latest patched version of CodeAstro Real Estate Management System (version number not specified in available data—contact CodeAstro directly); (5) If patching is not immediately available, implement parameterized queries or prepared statements in the registration code by modifying /register.php to use proper database abstraction layers; (6) Run database activity monitoring to detect injection attempts; (7) Audit database logs for suspicious queries and review user accounts created during the vulnerability window for unauthorized access. Vendors should provide specific patch versions and security advisories; recommend checking CodeAstro security advisories and changelog documentation.

Priority Score

57
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +36
POC: +20

Share

CVE-2025-5583 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy