Home

Description

EN DE

A security vulnerability has been detected in code-projects Simple Grading System 1.0. Affected by this issue is some unknown functionality of the file /delete_student.php of the component Admin Panel. Such manipulation of the argument ID leads to sql injection. The attack can be launched remotely. The exploit has been disclosed publicly and may be used.

Es wurde eine Schwachstelle in code-projects Simple Grading System 1.0 entdeckt. Betroffen ist eine unbekannte Funktion der Datei /delete_student.php der Komponente Admin Panel. Die Bearbeitung des Arguments ID verursacht sql injection. Ein Angriff ist aus der Distanz möglich. Der Exploit ist öffentlich verfügbar und könnte genutzt werden.

PUBLISHED Reserved 2025-08-29 | Published 2025-08-29 | Updated 2025-08-29 | Assigner VulDB




MEDIUM: 5.3CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
MEDIUM: 6.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
MEDIUM: 6.3CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
6.5AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR

Problem types

SQL Injection

Injection

Product status

1.0
affected

Timeline

2025-08-29:Advisory disclosed
2025-08-29:VulDB entry created
2025-08-29:VulDB entry last update

Credits

liule (VulDB User) reporter

References

vuldb.com/?id.321873 (VDB-321873 | code-projects Simple Grading System Admin Panel delete_student.php sql injection) vdb-entry technical-description

vuldb.com/?ctiid.321873 (VDB-321873 | CTI Indicators (IOB, IOC, TTP, IOA)) signature permissions-required

vuldb.com/?submit.637257 (Submit #637257 | https://code-projects.org/ simple-grading-system-in-php-with-source-code 1.0 SQL Injection) third-party-advisory

www.yuque.com/...ghuexlgkz/zepczx/uqhw0llf4ry9f2kk?singleDoc exploit

code-projects.org/ product

cve.org (CVE-2025-9666)

nvd.nist.gov (CVE-2025-9666)

Download JSON