CVE-2025-15182

7.3 HIGH

📋 TL;DR

CVE-2025-15182 is a SQL injection vulnerability in code-projects Refugee Food Management System 1.0 that allows remote attackers to execute arbitrary SQL commands via the refNo parameter in /home/served.php. This affects all deployments of version 1.0, potentially enabling unauthorized data access, modification, or deletion.

💻 Affected Systems

Products:
  • code-projects Refugee Food Management System
Versions: 1.0
Operating Systems: All operating systems running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: Affects any installation with the vulnerable /home/served.php file accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including data theft, data destruction, and potential server takeover via SQL injection leading to remote code execution.

🟠

Likely Case

Unauthorized access to sensitive refugee data, manipulation of food distribution records, and potential privilege escalation.

🟢

If Mitigated

Limited impact with proper input validation and database permissions, potentially only error messages or partial data exposure.

🌐 Internet-Facing: HIGH - The vulnerability is remotely exploitable and affects a web application component.
🏢 Internal Only: MEDIUM - Internal attackers could exploit this, but external threat is higher due to public exploit availability.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details are publicly available on GitHub, making this easily exploitable by attackers with basic SQL injection knowledge.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://code-projects.org/

Restart Required: No

Instructions:

No official patch available. Consider implementing input validation and parameterized queries as workaround.

🔧 Temporary Workarounds

Input Validation and Sanitization

all

Add server-side validation to sanitize the refNo parameter before processing.

Edit /home/served.php to add input validation using PHP filter functions or regex patterns

Web Application Firewall (WAF)

all

Deploy WAF rules to block SQL injection patterns targeting the refNo parameter.

Configure WAF to block requests containing SQL keywords in refNo parameter

🧯 If You Can't Patch

  • Isolate the system from internet access and restrict to internal network only
  • Implement strict network segmentation and monitor all database queries from the application

🔍 How to Verify

Check if Vulnerable:

Test the /home/served.php endpoint with SQL injection payloads in the refNo parameter (e.g., refNo=1' OR '1'='1).

Check Version:

Check application version in configuration files or about pages; system is vulnerable if version is 1.0.

Verify Fix Applied:

Verify that SQL injection payloads no longer execute and return appropriate error messages or are blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL error messages in application logs
  • Multiple failed login attempts or parameter manipulation in access logs

Network Indicators:

  • HTTP requests to /home/served.php with SQL keywords in parameters
  • Unusual database query patterns from application server

SIEM Query:

source="web_logs" AND uri="/home/served.php" AND (param="refNo" AND value MATCH "[';]|UNION|SELECT|INSERT|UPDATE|DELETE|DROP|OR")

🔗 References

📤 Share & Export