CVE Alert: CVE-2025-12256 – code-projects – Online Event Judging System
CVE-2025-12256
A weakness has been identified in code-projects Online Event Judging System 1.0. This vulnerability affects unknown code of the file /edit_contestant.php. Executing manipulation of the argument contestant_id can lead to sql injection. The attack can be executed remotely. The exploit has been made available to the public and could be exploited.
AI Summary Analysis
Risk verdict
Moderate risk driven by a remote SQL injection with a publicly available PoC; exploitation is not shown as active in the wild and requires low-privilege access.
Why this matters
If exploited, an attacker could read or modify contestant data and contest configuration, undermining competition integrity and exposing any stored personal data. The web-facing endpoint heightens exposure for small hosts or self-managed deployments.
Most likely attack path
An attacker remotely targets the edit_contestant.php endpoint with a crafted contestant_id to trigger a SQL injection. The CVSS indicates network access and no user interaction, but requires low privileges, suggesting an attacker with minimal access could attempt exploitation if the endpoint is reachable and not properly protected. Successful abuse could reveal or corrupt data within the same database scope.
Who is most exposed
Organizations running the Online Event Judging System 1.0 with the vulnerable file publicly accessible or inadequately access-controlled are most at risk, including small event hosts, educational cohorts, or hosted demo sites.
Detection ideas
- SQL error messages or unusual query patterns in web/app logs.
- Repeated unexpected values for contestant_id in access logs.
- Anomalous spikes of requests to edit_contestant.php without valid authentication.
- WAF alerts for SQL injection signatures targeting the endpoint.
- Sudden changes to contestant records or contest configurations.
Mitigation and prioritisation
- Apply patch or upgrade to a fixed release; if unavailable, implement parameterised queries and input validation on contestant_id.
- Enforce strict access control and IP allowlisting for edit_contestant.php; disable indirect access if not required.
- Implement or tune WAF rules to detect SQLi patterns on this endpoint; monitor for PoC indicators.
- Change-management: test fixes in staging, two-step deployment, and rollback plan.
- If KEV is confirmed or EPSS ≥ 0.5, treat as priority 1; otherwise treat as a high-priority remediation.
Support Our Work
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.
