CVE Alert: CVE-2025-10791 – code-projects – Online Bidding System

CVE-2025-10791

HIGHNo exploitation knownPoC observed

A weakness has been identified in code-projects Online Bidding System 1.0. This impacts an unknown function of the file /administrator/index.php. This manipulation of the argument aduser causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.

CVSS v3.1 (7.3)
Vendor
code-projects
Product
Online Bidding System
Versions
1.0
CWE
CWE-89, SQL Injection
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Published
2025-09-22T09:02:06.548Z
Updated
2025-09-22T13:44:23.646Z

AI Summary Analysis

Risk verdict

High risk: remote SQL injection with a publicly available PoC and automatable exploit likely; urgent remediation recommended.

Why this matters

The vulnerability enables unauthenticated access to the application layer, with potential to exfiltrate or tamper user data and bids, and potentially disrupt auctions. Public availability of the exploit increases the chance of automated scanning and mass exploitation, raising breach and reputational risk for bidding-platform operators.

Most likely attack path

Attackers can target the /administrator/index.php aduser parameter over the network without user interaction or privileges. Successful injections could expose or modify data (C/L I/L A/L), with no preconditions other than access to the web app, enabling rapid, automated abuse and possible lateral movement within the hosting environment.

Who is most exposed

Sites deploying code-projects Online Bidding System with a publicly reachable admin interface are at highest risk. Organisations hosting on shared or poorly hardened web servers, or using default/unchanged admin paths, are especially vulnerable.

Detection ideas

  • Web logs show repeated requests to /administrator/index.php with malicious aduser values.
  • SQL error messages or abnormal query patterns surface in application logs.
  • WAF detects SQLi-like payloads targeting the admin endpoint.
  • Unusual spikes in 500 errors or slow queries during admin access windows.
  • Public PoC strings observed in traffic or logs.

Mitigation and prioritisation

  • Apply any vendor hotfix or upgrade to a patched build immediately.
  • Implement prepared statements/parameterised queries and strict input validation.
  • Restrict admin interface access to trusted IPs; enable MFA for admin accounts.
  • Deploy targeted WAF rules to block SQLi patterns; monitor and log aduser parameter usage.
  • Plan a change window for patch testing and rollback readiness; ensure backups prior to deployment.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.