CVE Alert: CVE-2025-11584 – code-projects – Online Job Search Engine

CVE-2025-11584

HIGHNo exploitation known

A vulnerability has been found in code-projects Online Job Search Engine 1.0. The affected element is an unknown function of the file /searchjob.php. The manipulation of the argument txtspecialization leads to sql injection. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used.

CVSS v3.1 (7.3)
Vendor
code-projects
Product
Online Job Search Engine
Versions
1.0
CWE
CWE-89, SQL Injection
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Published
2025-10-10T20:32:05.844Z
Updated
2025-10-10T20:32:05.844Z

AI Summary Analysis

Risk verdict

High risk: remote SQL injection on a publicly reachable searchendpoint, with exploit publicly disclosed and no authentication required.

Why this matters

The vulnerability allows attacker data exposure and possible manipulation of the database, risking confidential candidate and job data, integrity of listings, and potential downtime. With PoC/public awareness, opportunistic targeting is likely and impact scales with the database privileges.

Most likely attack path

An attacker sends crafted input in txtspecialization to /searchjob.php, triggering an SQL injection due to lack of input sanitisation. No user interaction or authentication is required (network access, low complexity). If the DB user has sufficient rights, data exfiltration or modification is feasible; even with limited privileges, sensitive data exposure is possible.

Who is most exposed

Public-facing PHP web applications running code-projects-style search interfaces are exposed via the internet, commonly on SME deployments using LAMP stacks or generic hosting. Such setups often run with web DB access reachable from external networks.

Detection ideas

  • Logs show requests to searchjob.php with SQLi-like payloads (UNION SELECT, SELECT, OR 1=1, comments).
  • Database errors or unusual long-running queries tied to txtspecialization inputs.
  • spikes in 500s or elevated query latency corresponding to specific inputs.
  • WAF/IDS alerts for SQL injection signatures against the endpoint.
  • Unusual data access patterns or export-like data dumps from the DB.

Mitigation and prioritisation

  • Apply vendor patch or upgrade to a fixed version; if unavailable, implement immediate input validation and parameterised queries (prepared statements) in searchjob.php.
  • Refactor to use bound parameters; avoid dynamic SQL and concatenation.
  • Enforce least-privilege DB credentials; disable unnecessary DB features; suppress verbose error messages.
  • Deploy or tune a Web Application Firewall with SQLi rules; monitor for injection attempts.
  • Change-management: test fixes in a staging environment; schedule rapid production rollout; implement continuous monitoring for signs of exploitation.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.