{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-14251","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-12-08T06:04:34.880Z","datePublished":"2025-12-08T16:02:05.729Z","dateUpdated":"2025-12-08T17:10:25.176Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-12-08T16:02:05.729Z"},"title":"code-projects Online Ordering System Admin Login admin sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"SQL Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-74","lang":"en","description":"Injection"}]}],"affected":[{"vendor":"code-projects","product":"Online Ordering System","versions":[{"version":"1.0","status":"affected"}],"modules":["Admin Login"]}],"descriptions":[{"lang":"en","value":"A security vulnerability has been detected in code-projects Online Ordering System 1.0. This affects an unknown function of the file /admin/ of the component Admin Login. Such manipulation of the argument Username leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.9,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":7.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV3_0":{"version":"3.0","baseScore":7.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV2_0":{"version":"2.0","baseScore":7.5,"vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-12-08T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-12-08T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-12-08T07:09:43.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"zzb1 (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.334761","name":"VDB-334761 | code-projects Online Ordering System Admin Login admin sql injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.334761","name":"VDB-334761 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.702467","name":"Submit #702467 | code-projects Online Ordering System V1.0 SQL injection","tags":["third-party-advisory"]},{"url":"https://github.com/zzb1388/cve/issues/95","tags":["exploit","issue-tracking"]},{"url":"https://code-projects.org/","tags":["product"]}],"tags":["x_freeware"]},"adp":[{"references":[{"url":"https://github.com/zzb1388/cve/issues/95","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-12-08T17:00:17.937397Z","id":"CVE-2025-14251","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-12-08T17:10:25.176Z"}}]}}