CVE-2025-0172
Published: 02 January 2025
Summary
CVE-2025-0172 is a medium-severity Injection (CWE-74) vulnerability in Code-Projects Chat System. Its CVSS base score is 6.3 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 30.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents SQL injection by requiring validation of user-supplied inputs like the 'id' argument in /admin/deleteroom.php.
Requires identification, reporting, and correction of system flaws, directly remediating the SQL injection vulnerability in CVE-2025-0172.
Mandates vulnerability scanning to proactively identify and address SQL injection flaws like CVE-2025-0172 before exploitation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Direct remote SQL injection in a web application (/admin/deleteroom.php) enables exploitation of a public-facing service for data access/modification.
NVD Description
A vulnerability has been found in code-projects Chat System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/deleteroom.php. The manipulation of the argument id leads to sql injection. The attack can be…
more
launched remotely. The exploit has been disclosed to the public and may be used.
Deeper analysisAI
CVE-2025-0172 is a critical SQL injection vulnerability in code-projects Chat System 1.0, affecting an unknown functionality within the /admin/deleteroom.php file. The issue arises from improper handling of the 'id' argument, allowing manipulation that leads to SQL injection. It is associated with CWE-74 (Improper Neutralization of Special Elements used in an SQL Command) and CWE-89 (SQL Injection), with a CVSS v3.1 base score of 6.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L). The vulnerability was published on 2025-01-02.
The vulnerability can be exploited remotely by low-privileged users (PR:L), such as authenticated administrators, over the network with low complexity and no user interaction required. Successful exploitation enables limited impacts on confidentiality, integrity, and availability (C:L/I:L/A:L), potentially allowing attackers to extract sensitive data, modify chat room records, or disrupt service through injected SQL payloads.
Advisories and references, including those from VulDB (ctiid.289939, id.289939, submit.473153) and a GitHub proof-of-concept at github.com/Sinon2003/cve/blob/main/chatsystem/sql_inject2.md, confirm the remote exploitability. The exploit has been publicly disclosed and may be actively used, though no specific patches or mitigation steps are detailed in the available information; practitioners should review the code-projects.org site and referenced materials for updates or workarounds.
Details
- CWE(s)