CVE Alert: CVE-2025-12255 – code-projects – Online Event Judging System

CVE-2025-12255

MEDIUMNo exploitation knownPoC observed

A security flaw has been discovered in code-projects Online Event Judging System 1.0. This affects an unknown part of the file /add_contestant.php. Performing manipulation of the argument fullname results in sql injection. Remote exploitation of the attack is possible. The exploit has been released to the public and may be exploited.

CVSS v3.1 (6.3)
Vendor
code-projects
Product
Online Event Judging System
Versions
1.0
CWE
CWE-89, SQL Injection
Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Published
2025-10-27T09:02:11.193Z
Updated
2025-10-27T15:48:22.191Z

AI Summary Analysis

Risk verdict

Urgent: public PoC availability for a remote SQL injection on an input endpoint enables manipulation of the fullname field, creating exploitable risk without user interaction.

Why this matters

SQL injection can disclose or modify contestant data and compromise database integrity, with potential leakage of sensitive information. The remote, unauthenticated-feeling access and a published PoC elevate the likelihood of automated scans and exploitation against exposed web apps.

Most likely attack path

An attacker sends crafted input to the add_contestant.php endpoint over the network, exploiting unsanitised SQL via the fullname parameter. The flaw requires low privileges but is remotely reachable, so successful exploitation could read or alter data and may serve as a foothold for later steps within the app’s database.

Who is most exposed

Web portals handling contest submissions, especially those hosted on shared hosting or university/education platforms using PHP/MySQL stacks, are typical targets.

Detection ideas

  • Monitor for SQL error messages or unusual query failures in app logs.
  • Flag requests with suspicious fullname payloads (e.g., injected quotes, comment closures).
  • IDS/WAF alerts for SQLi patterns in parameters.
  • Anomalous read/write patterns following contestant submissions.
  • External scans or PoC signatures observed in network traffic.

Mitigation and prioritisation

  • Apply vendor patch or upgrade to a fixed release; if unavailable, retrofit with parameterised queries and prepared statements.
  • Validate and sanitise fullname with a strict whitelist; enforce length limits.
  • Implement WAF rules and rate limiting for the affected endpoint.
  • Enforce least-privilege DB access for the web app user; segregate duties.
  • Schedule change-management updates and test in staging before live deployment.

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features