CVE Alert: CVE-2025-9662 – code-projects – Simple Grading System

CVE-2025-9662

HIGHNo exploitation knownPoC observed

A vulnerability was determined in code-projects Simple Grading System 1.0. This affects an unknown function of the file /login.php of the component Admin Panel. Executing manipulation can lead to sql injection. The attack may be performed from a remote location. The exploit has been publicly disclosed and may be utilized.

CVSS v3.1 (7.3)
Vendor
code-projects
Product
Simple Grading System
Versions
1.0
CWE
CWE-89, SQL Injection
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Published
2025-08-29T16:32:11.721Z
Updated
2025-08-29T16:58:31.195Z

AI Summary Analysis

Risk verdict

High risk: remote, unauthenticated SQL injection in the Admin Panel login with public exploitability; exploitation is feasible and automatable based on the advisory indicators.

Why this matters

Successful exploitation could disclose or alter backend data, compromise admin credentials, and enable broader access to the application’s database. This threatens data integrity, availability of the grading system, and regulatory/trust impacts for educational institutions relying on the product.

Most likely attack path

No user interaction needed (UI: N) and remote access (AV: Network). An attacker can send crafted input to login.php to subvert SQL queries (CWE-89/CWE-74), bypass authentication, and gain database access (PR:N, Scope: U). The high base impact on confidentiality, integrity, and availability suggests rapid data exposure or modification with little to no traceable user context.

Who is most exposed

Typical exposure patterns are self-hosted or cloud-hosted installations with publicly reachable Admin Panel endpoints. Organisations using small to mid-sized deployments of code-projects Simple Grading System are particularly at risk.

Detection ideas

  • Anomalous login requests containing apparent SQLi payloads (e.g., tautologies, UNION SELECT).
  • Database error messages or unusual error propagation in login responses.
  • spikes in failed login attempts from diverse IPs or suspicious query strings in web server logs.
  • IDS/WAF alerts for SQLi patterns targeting login.php.
  • Unusual post-authentication activity or data access tied to login events.

Mitigation and prioritisation

  • Apply vendor patch or upgrade to fixed version; verify fix in staging before production.
  • Enforce parameterised queries and strict input validation in login.php.
  • Restrict Admin Panel access to trusted networks or via VPN; enable MFA for admin accounts.
  • Deploy WAF rules to block common SQLi payloads and monitor for related anomalies.
  • Implement detailed logging and alerting for login endpoints; conduct post-patch validation and regression testing.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.