CVE-2025-5979

| EUVD-2025-17833 HIGH
2025-06-10 [email protected]
7.3
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low

Lifecycle Timeline

4
Analysis Generated
Mar 14, 2026 - 19:49 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 19:49 euvd
EUVD-2025-17833
PoC Detected
Jun 16, 2025 - 15:00 vuln.today
Public exploit code
CVE Published
Jun 10, 2025 - 21:15 nvd
HIGH 7.3

Description

A vulnerability classified as critical has been found in code-projects School Fees Payment System 1.0. This affects an unknown part of the file /branch.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

Analysis

Critical SQL injection vulnerability in code-projects School Fees Payment System version 1.0, specifically in the /branch.php file's ID parameter, allowing remote unauthenticated attackers to execute arbitrary SQL commands. The vulnerability has been publicly disclosed with proof-of-concept exploitation available, and while the CVSS score is 7.3 (High), the unauthenticated network-accessible attack vector combined with confirmed public exploit disclosure indicates active exploitation risk. This affects all deployments of the vulnerable version without patches applied.

Technical Context

The vulnerability is rooted in CWE-74 (Improper Neutralization of Special Elements in Output Used by a Downstream Component - Injection), which represents insufficient input validation and output encoding in SQL context. The affected application, code-projects School Fees Payment System 1.0, fails to properly sanitize or parameterize the 'ID' parameter passed to /branch.php, allowing attackers to inject malicious SQL syntax directly into database queries. The web application architecture suggests a PHP-based backend with direct SQL query construction rather than prepared statements or parameterized queries (likely MySQL/MariaDB). The attack surface is maximized by the lack of authentication requirements (PR:N in CVSS vector) and the simplicity of HTTP-based exploitation over network protocols.

Affected Products

code-projects School Fees Payment System version 1.0 - all installations. CPE data not explicitly provided in source, but inferred CPE would be: cpe:2.3:a:code-projects:school_fees_payment_system:1.0:*:*:*:*:*:*:*. Affected component: /branch.php (parameter: ID). All deployment configurations running this version on accessible web servers are affected regardless of underlying OS, web server (Apache, Nginx), or PHP version, though PHP versions supporting this codebase (likely 5.6+) are prerequisites. No vendor advisory links provided in available references.

Remediation

Immediate remediation steps: (1) **Patch/Upgrade**: Update code-projects School Fees Payment System to a version beyond 1.0 that implements parameterized queries or prepared statements for the /branch.php ID parameter; (2) **Input Validation Workaround** (if patch unavailable): Implement strict whitelist validation ensuring ID parameter contains only numeric characters before query execution (e.g., regex: ^[0-9]+$); (3) **WAF Mitigation**: Deploy Web Application Firewall rules to block requests containing SQL keywords (SELECT, UNION, DROP, etc.) in the ID parameter; (4) **Database Hardening**: Limit database user permissions to minimal required privileges (read-only for queries, no DROP/ALTER); (5) **Access Control**: Restrict /branch.php access via IP whitelisting or authentication layer until patched; (6) **Monitoring**: Enable SQL query logging and audit logs for anomalous query patterns. No official vendor patches referenced; contact code-projects support for security update availability.

Priority Score

57
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +36
POC: +20

Share

CVE-2025-5979 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy