CVE-2025-11329
📋 TL;DR
This SQL injection vulnerability in code-projects Online Course Registration 1.0 allows attackers to manipulate database queries through the ID parameter in /admin/manage-students.php. Attackers can potentially read, modify, or delete database contents remotely. Organizations using this specific software version are affected.
💻 Affected Systems
- code-projects Online Course Registration
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise including data theft, data manipulation, authentication bypass, and potential server takeover via SQL injection to RCE chaining.
Likely Case
Unauthorized access to student records, course data, and potentially admin credentials stored in the database.
If Mitigated
Limited impact with proper input validation, parameterized queries, and network segmentation in place.
🎯 Exploit Status
Exploit details are publicly available; requires admin access to reach vulnerable endpoint.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: https://code-projects.org/
Restart Required: No
Instructions:
1. Check vendor website for updates 2. Apply any available patches 3. Test functionality after patching
🔧 Temporary Workarounds
Input Validation and Sanitization
allImplement strict input validation and parameterized queries for the ID parameter
Web Application Firewall
allDeploy WAF with SQL injection protection rules
🧯 If You Can't Patch
- Restrict access to /admin/ directory to trusted IP addresses only
- Implement network segmentation to isolate the vulnerable system
🔍 How to Verify
Check if Vulnerable:
Check if running code-projects Online Course Registration version 1.0 and if /admin/manage-students.php exists
Check Version:
Check application files or documentation for version information
Verify Fix Applied:
Test SQL injection attempts against the ID parameter to confirm they are blocked
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL queries in application logs
- Multiple failed login attempts to admin interface
- Unexpected database access patterns
Network Indicators:
- SQL injection payloads in HTTP requests to /admin/manage-students.php
- Unusual outbound database connections
SIEM Query:
source="web_logs" AND uri="/admin/manage-students.php" AND (request CONTAINS "UNION" OR request CONTAINS "SELECT" OR request CONTAINS "OR 1=1")