CVE Alert: CVE-2025-10795 – code-projects – Online Bidding System

CVE-2025-10795

HIGHNo exploitation knownPoC observed

A vulnerability has been found in code-projects Online Bidding System 1.0. This affects an unknown part of the file /administrator/bidupdate.php. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

CVSS v3.1 (7.3)
Vendor
code-projects
Product
Online Bidding System
Versions
1.0
CWE
CWE-89, SQL Injection
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Published
2025-09-22T11:02:06.405Z
Updated
2025-09-22T11:43:15.807Z

AI Summary Analysis

Risk verdict

High risk: remote SQL injection with a publicly disclosed PoC and no authentication required; treat as urgent to validate and patch.

Why this matters

Direct manipulation of the ID parameter could expose or corrupt data in the database, impacting data integrity and potentially leaking sensitive information. Since the flaw is accessible without user interaction or credentials, any adversary could attempt automated exploitation against admin-like functionality.

Most likely attack path

An attacker sends crafted input to the bidupdate.php endpoint, exploiting the SQLi vulnerability in the ID argument. With network vector access and no privileges required, successful exploitation can read or modify database contents, with limited impact per CVSS metrics but clear potential for data exposure and partial service disruption at the application layer.

Who is most exposed

Any deployment where the administrator interface is internet-facing or inadequately protected is at risk, including on-prem or cloud-hosted instances of the Online Bidding System used by organisations with broad user access and publicly reachable admin paths.

Detection ideas

  • Unusual large or malformed requests to /administrator/bidupdate.php with suspicious ID inputs.
  • SQL error messages or abnormal response timing from the endpoint.
  • WAF/IDS alerts for SQL injection patterns targeting the ID parameter.
  • Repeated failed or unusual authentication patterns directed at admin paths (even if unauthenticated vectors exist).
  • Anomalous database query logs showing injected statements.

Mitigation and prioritisation

  • Apply vendor patch or upgrade to fixed release; verify patch in a staging environment before production.
  • If patching is delayed, implement compensating controls: enforce input validation, use parameterised queries, and disable direct admin actions via the endpoint; deploy strict allowlisting or VPN access for admin interfaces.
  • Enable web application firewall rules and monitor for SQLi indicators; implement DB least privilege accounts and separate admin credentials.
  • Change-management: schedule patch window, perform impact assessment, and validate after deployment.
  • If KEV true or EPSS ≥ 0.5, treat as priority 1 (not indicated here).

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.