CVE Alert: CVE-2025-12308 – code-projects – Nero Social Networking Site

CVE-2025-12308

HIGHNo exploitation knownPoC observed

A security flaw has been discovered in code-projects Nero Social Networking Site 1.0. Affected by this issue is some unknown functionality of the file /deletemessage.php. Performing manipulation of the argument message_id results in sql injection. It is possible to initiate the attack remotely. The exploit has been released to the public and may be exploited.

CVSS v3.1 (7.3)
Vendor
code-projects
Product
Nero Social Networking Site
Versions
1.0
CWE
CWE-89, SQL Injection
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Published
2025-10-27T19:02:08.377Z
Updated
2025-10-27T20:38:22.509Z

AI Summary Analysis

Risk verdict: High risk due to remote SQL injection with a publicly available PoC; urgent remediation strongly recommended.

Why this matters: The flaw allows manipulation of the message_id parameter without authentication or user interaction, enabling potential data exposure, modification or deletion via the database. Public availability of an exploit raises likelihood of automated or opportunistic attacks against exposed installations.

Most likely attack path: An attacker can remotely target /deletemessage.php by sending crafted values for message_id, triggering SQL injection without credentials (AV:N, PR:N, UI:N). The breach likely impacts the DB layer (C/L, I/L, A/L potential), enabling data read or alteration under the app’s DB user privileges. Given no preconditions on user accounts, reconnaissance or rapid exploitation is plausible, with limited scope to the affected application unless DB credentials are misused.

Who is most exposed: Publicly reachable Nero Social Networking Site 1.0 deployments running PHP/MySQL or similar stacks, especially those without input sanitisation, prepared statements, or WAF protections; smaller organisations and hobby projects are common risk groups.

Detection ideas:

  • Logs show suspicious message_id inputs and SQL error patterns originating from /deletemessage.php.
  • Web/app logs display abnormal query strings or unusual 1=1-style payloads in query parameters.
  • WAF/IDS alerts for SQLi signatures targeting the endpoint.
  • Unusual DB activity: unexpected row reads/edits from the application user.
  • Increased error-rate or latency tied to the deletemessage endpoint.

Mitigation and prioritisation:

  • Apply vendor patch or upgrade to fixed version; if unavailable, implement parameterised queries and strict input validation around message_id.
  • Disable or restrict access to the deletemessage endpoint; require authentication and authorization checks; enforce least-privilege DB user.
  • Implement input sanitisation, prepared statements, and ORM protections; add CSRF controls if relevant.
  • Add or tighten WAF rules to block common SQLi payloads targeting this endpoint.
  • Plan rapid change-management: test in a staging environment, then roll out with monitoring and rollback procedures.
  • Note: KEV/EPSS data not provided; with a PoC present and remote exploit possible, proceed with elevated cross-team prioritisation and patching timelines.

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features