CVE Alert: CVE-2025-9733 – code-projects – Human Resource Integrated System

CVE-2025-9733

HIGHNo exploitation known

A security flaw has been discovered in code-projects Human Resource Integrated System 1.0. This impacts an unknown function of the file /login_timeee.php. Performing manipulation of the argument emp_id results in sql injection. The attack may be initiated remotely. The exploit has been released to the public and may be exploited.

CVSS v3.1 (7.3)
Vendor
code-projects
Product
Human Resource Integrated System
Versions
1.0
CWE
CWE-89, SQL Injection
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Published
2025-08-31T14:32:06.605Z
Updated
2025-08-31T14:32:06.605Z

AI Summary Analysis

Risk verdict

High risk: remote, unauthenticated SQL injection with public exploit availability; immediate attention and patching required.

Why this matters

Compromise could expose confidential HR data and payroll details, with potential data exfiltration. The attacker could leverage the vulnerability to read or modify records within the HRIS, risking regulatory exposure and trust, especially in organisations with internet-facing HR portals.

Most likely attack path

No user interaction is required; an attacker can remotely trigger the vulnerability via the login_timeee.php endpoint by manipulating emp_id. With network access and minimal prerequisites, an attacker may exfiltrate data or corrupt records within the affected scope, with limited but real risk of broader impact if adjacent systems rely on the same database.

Who is most exposed

HRIS deployments that expose login endpoints to the internet or poorly segmented networks are at greatest risk; typical footprints include mid-size organisations using web-hosted or on-prem HR systems with standard database permissions.

Detection ideas

  • Unusual SQL error patterns in login_timeee.php logs.
  • Abnormal emp_id query strings or high-entropy input in login requests.
  • Increased failed and anomalous authentication attempts from external IPs.
  • Database query logs showing atypical SELECT/INSERT patterns tied to HRIS endpoints.
  • WAF/IDS alerts for SQL injection payloads targeting login_timeee.php.

Mitigation and prioritisation

  • Apply vendor advisory and upgrade to non-affected version if available.
  • Enforce parameterised queries and strict input validation on emp_id; retire dynamic SQL.
  • Restrict access to the HRIS login page to trusted networks; implement network segmentation.
  • Deploy application-layer and database access controls; rotate DB credentials and monitor for anomalous access.
  • Enable comprehensive logging and real-time alerting for login_timeee.php activity.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.