CVE-2025-0347
Published: 09 January 2025
Summary
CVE-2025-0347 is a high-severity Injection (CWE-74) vulnerability in Anisha Admission Management System. Its CVSS base score is 7.3 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 21.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SC-7 (Boundary Protection) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents SQL injection by enforcing validation and sanitization of the u_id input parameter in the login component's index.php.
Mandates timely identification, reporting, and correction of the SQL injection flaw in index.php to eliminate the vulnerability.
Enforces boundary protection with web application firewalls to monitor and block remote SQL injection attempts via the u_id argument.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection vulnerability in unauthenticated public-facing web login (index.php u_id parameter) enables remote exploitation for initial access (T1190), credential access via database dumps (T1212), and collection from databases (T1213.006).
NVD Description
A vulnerability was found in code-projects Admission Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file index.php of the component Login. The manipulation of the argument u_id leads to sql injection. The…
more
attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
Deeper analysisAI
CVE-2025-0347 is a critical SQL injection vulnerability (CWE-74, CWE-89) in code-projects Admission Management System 1.0. The flaw affects unknown code in the index.php file of the Login component, where manipulation of the u_id argument enables SQL code injection. Published on 2025-01-09, it carries a CVSS v3.1 base score of 7.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L).
Remote attackers require no privileges or user interaction to exploit this vulnerability. By injecting malicious SQL via the u_id parameter, they can achieve low-level impacts on confidentiality, integrity, and availability, such as limited data exposure, modification, or disruption.
Advisories and further details are documented on VulDB (https://vuldb.com/?id.290860, https://vuldb.com/?ctiid.290860, https://vuldb.com/?submit.476898), a GitHub issue (https://github.com/Curious-L/-/issues/3), and the project site (https://code-projects.org/).
The exploit has been publicly disclosed and may be used by attackers.
Details
- CWE(s)