CVE-2025-13302

4.7 MEDIUM

📋 TL;DR

CVE-2025-13302 is an SQL injection vulnerability in code-projects Courier Management System 1.0 that allows attackers to manipulate database queries through the ManagerName parameter in /add-new-officer.php. This can lead to unauthorized data access, modification, or deletion. Organizations using this specific software version are affected.

💻 Affected Systems

Products:
  • code-projects Courier Management System
Versions: 1.0
Operating Systems: Any OS running PHP web server
Default Config Vulnerable: ⚠️ Yes
Notes: Affects installations with /add-new-officer.php accessible and no input sanitization.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including data theft, data destruction, or full system takeover through privilege escalation.

🟠

Likely Case

Unauthorized access to sensitive courier management data, customer information, or business records.

🟢

If Mitigated

Limited impact with proper input validation and database permissions restricting damage scope.

🌐 Internet-Facing: HIGH - Attack can be launched remotely and exploit is publicly available.
🏢 Internal Only: MEDIUM - Internal attackers could exploit if system is accessible on internal network.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details are publicly available on GitHub and vuldb.com, making this easily exploitable.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://code-projects.org/

Restart Required: No

Instructions:

1. Check vendor website for updates 2. If no patch available, implement workarounds 3. Consider replacing with alternative software

🔧 Temporary Workarounds

Input Validation and Sanitization

all

Add parameterized queries and input validation to /add-new-officer.php

Modify PHP code to use prepared statements: $stmt = $conn->prepare('INSERT INTO officers (ManagerName) VALUES (?)'); $stmt->bind_param('s', $ManagerName);

Access Restriction

all

Block access to vulnerable endpoint or restrict to authorized users only

Add .htaccess rules: Order Deny,Allow
Deny from all
Allow from 192.168.1.0/24
Add authentication check at top of add-new-officer.php

🧯 If You Can't Patch

  • Implement web application firewall (WAF) with SQL injection rules
  • Isolate the system in a segmented network with strict access controls

🔍 How to Verify

Check if Vulnerable:

Test /add-new-officer.php endpoint with SQL injection payloads in ManagerName parameter

Check Version:

Check software version in admin panel or readme files

Verify Fix Applied:

Attempt SQL injection after implementing fixes and verify no database errors or unexpected behavior

📡 Detection & Monitoring

Log Indicators:

  • SQL syntax errors in web server logs
  • Unusual database queries from web application
  • Multiple failed login attempts or parameter manipulation

Network Indicators:

  • HTTP requests to /add-new-officer.php with SQL keywords in parameters
  • Unusual database traffic patterns

SIEM Query:

source="web_server.log" AND ("add-new-officer.php" AND ("SELECT" OR "UNION" OR "--" OR "' OR '1'='1"))

🔗 References

📤 Share & Export