CVE Alert: CVE-2025-12252 – code-projects – Online Event Judging System
CVE-2025-12252
A vulnerability was found in code-projects Online Event Judging System 1.0. Affected is an unknown function of the file /ajax/action.php. The manipulation of the argument content results in sql injection. The attack can be launched remotely. The exploit has been made public and could be used.
AI Summary Analysis
Risk verdict
Medium-high risk due to a publicly disclosed SQL injection with a PoC, exploitable over the network and requiring only low-privilege authentication; urgency is warranted for exposed deployments.
Why this matters
Successful exploitation can lead to unauthorised data access, alteration of judging results, or leakage of user information. In a live event environment, even small data integrity or reputational losses can disrupt competition timelines and erode trust.
Most likely attack path
Attacker authenticates with low privileges, targets the /ajax/action.php endpoint, and injects crafted content to induce SQLi. The vulnerability enables remote abuse with no user interaction, potentially allowing data exfiltration or tampering within the judging database and limited lateral movement within the application’s data layer.
Who is most exposed
Web-hosted online judging systems—especially those deployed with internet exposure and shared database credentials—are at greatest risk. Universities, coding platforms, and event organisers using exposed instances are common patterns likely affected.
Detection ideas
- Unusual or malformed SQL patterns in the content parameter of action.php requests
- Spikes in network requests to /ajax/action.php with anomalous payloads
- Database error messages or elevated error counts related to content handling
- Unexpected data reads/writes or score/table modifications
- Repeated login attempts from clusters targeting the endpoint
Mitigation and prioritisation
- Apply vendor patch or remediation to fix the SQL injection; verify fix in staging before production.
- Enforce least-privilege DB access and separate credentials for webApp DB user.
- Parameterise queries, validate and constrain the content parameter; disable or sanitise dynamic content fields.
- Implement WAF/IPS rules to block SQLi patterns in user-supplied content.
- Schedule patching with change-management, monitor post-deployment for anomalous activity.
- Treat as priority 2 (PoC present; no KEV/EPSS data provided).
Support Our Work
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.
