CVE Alert: CVE-2025-12306 – code-projects – Nero Social Networking Site

CVE-2025-12306

HIGHNo exploitation knownPoC observed

A vulnerability was determined in code-projects Nero Social Networking Site 1.0. Affected is an unknown function of the file /acceptoffres.php. This manipulation of the argument ID causes sql injection. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized.

CVSS v3.1 (7.3)
Vendor
code-projects
Product
Nero Social Networking Site
Versions
1.0
CWE
CWE-89, SQL Injection
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Published
2025-10-27T18:32:10.935Z
Updated
2025-10-27T20:37:24.576Z

AI Summary Analysis

Risk verdict

High risk: remote, unauthenticated SQL injection with a publicly disclosed PoC and automatable exploit potential.

Why this matters

Attacker control over the backend DB via a web-facing endpoint could lead to data exfiltration, data integrity loss, or manipulation of offers. The business impact includes reputational damage, customer trust erosion, and potential compliance exposure if sensitive data is accessed.

Most likely attack path

No user interaction needed; an HTTP request to /acceptoffres.php with a crafted ID may trigger the injection. The attacker relies on the web app’s DB user permissions (likely not highly privileged) but could still read or modify data. Exploitation success hinges on the app’s query construction and DB access scope, with potential data leakage or record tampering.

Who is most exposed

Publicly accessible Nero Social Networking Site deployments on internet-facing PHP/LAMP stacks, especially older or poorly patched instances with weak input handling.

Detection ideas

  • Web server logs show unusual patterns for acceptoffres.php, e.g., malformed or increasingly long ID parameters
  • SQL error messages or stack traces in HTTP responses or logs
  • Spikes in DB query latency or abnormal query shapes from the app
  • WAF/IDS alerts for SQLi-like payloads
  • Known PoC/IIOC signatures from CTI feeds

Mitigation and prioritisation

  • Apply vendor patch or upgrade to fixed release as a priority
  • Enforce parameterised queries and input validation; avoid dynamic SQL
  • Use least-privilege DB credentials for the web app
  • Deploy WAF/IDS rules targeting SQL injection patterns; monitor for PoC indicators
  • Change-management: schedule urgent remediation; document rollback plans
  • If KEV true or EPSS ≥ 0.5, treat as priority 1

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features