CVE-2025-6293

| EUVD-2025-18709 HIGH
2025-06-20 [email protected]
7.3
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low

Lifecycle Timeline

4
Analysis Generated
Mar 15, 2026 - 00:19 vuln.today
EUVD ID Assigned
Mar 15, 2026 - 00:19 euvd
EUVD-2025-18709
PoC Detected
Oct 23, 2025 - 20:06 vuln.today
Public exploit code
CVE Published
Jun 20, 2025 - 01:15 nvd
HIGH 7.3

Description

A vulnerability was found in code-projects Hostel Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /contact_manager.php. The manipulation of the argument student_roll_no leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

Analysis

CVE-2025-6293 is a critical SQL injection vulnerability in code-projects Hostel Management System v1.0 affecting the /contact_manager.php endpoint, where the student_roll_no parameter is inadequately sanitized, allowing unauthenticated remote attackers to execute arbitrary SQL queries and potentially exfiltrate, modify, or delete database records. Public exploit disclosure and active exploitation signals indicate this is a high-priority threat requiring immediate remediation.

Technical Context

The vulnerability exists in a PHP-based web application (Hostel Management System) where user input via the student_roll_no parameter in /contact_manager.php is directly incorporated into SQL queries without proper parameterization or prepared statements. This represents a classic CWE-74 (Improper Neutralization of Special Elements in Output Used by a Downstream Component) manifestation—specifically SQL injection. The root cause is the absence of input validation, output encoding, or prepared statement usage when constructing database queries. The attack vector is network-based with no authentication required (PR:N), low attack complexity (AC:L), and no user interaction (UI:N), indicating a straightforward injection point likely exploitable through HTTP GET/POST requests to /contact_manager.php with crafted student_roll_no payloads containing SQL syntax (e.g., ' OR '1'='1, UNION-based queries).

Affected Products

code-projects Hostel Management System version 1.0. CPE would be: cpe:2.3:a:code-projects:hostel_management_system:1.0:*:*:*:*:*:*:*. No patch version information is disclosed in the provided data; the vendor's patch/update status is unknown. Affected component: /contact_manager.php endpoint (parameter: student_roll_no). Any deployment of this application version with internet accessibility is at risk; internal network deployments remain vulnerable to authenticated or network-adjacent attackers.

Remediation

1) IMMEDIATE: Disable or restrict access to /contact_manager.php via WAF/firewall rules until patching is possible. 2) Apply parameterized queries (prepared statements) to all database interactions in contact_manager.php—replace string concatenation with placeholders (e.g., PDO prepared statements or mysqli prepared statements in PHP). 3) Implement strict input validation on student_roll_no (whitelist alphanumeric characters, validate format against expected roll number pattern). 4) Use output encoding and ORM frameworks where applicable. 5) Monitor database access logs for SQL injection patterns (UNION, SELECT, OR statements in unexpected parameters). 6) Contact code-projects for patch availability; if no patch exists, consider migrating to an alternative, actively maintained hostel management system. 7) Audit all other endpoints in the application for similar injection vulnerabilities (contact_manager.php is likely not the only vulnerable point).

Priority Score

57
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +36
POC: +20

Share

CVE-2025-6293 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy