CVE-2025-0967
Published: 02 February 2025
Summary
CVE-2025-0967 is a medium-severity Injection (CWE-74) vulnerability in Fabian Chat System. Its CVSS base score is 6.3 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 10.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents SQL injection by validating and sanitizing untrusted inputs like chatname and chatpass before processing in add_chatroom.php.
Requires timely remediation of the specific SQL injection flaw in the chat system's /user/add_chatroom.php endpoint.
Enforces restrictions on input types, formats, and volumes to block malicious SQL payloads in chatname and chatpass arguments.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in remotely accessible web app component directly enables exploitation of public-facing application for limited data access/modification.
NVD Description
A vulnerability was found in code-projects Chat System 1.0 and classified as critical. This issue affects some unknown processing of the file /user/add_chatroom.php. The manipulation of the argument chatname/chatpass leads to sql injection. The attack may be initiated remotely. The…
more
exploit has been disclosed to the public and may be used.
Deeper analysisAI
CVE-2025-0967 is a critical SQL injection vulnerability in code-projects Chat System 1.0, affecting the processing of the file /user/add_chatroom.php. The issue arises from improper handling of the chatname and chatpass arguments, allowing manipulation that leads to SQL injection as classified under CWE-74 and CWE-89. It carries a CVSS v3.1 base score of 6.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L) and was published on 2025-02-02.
The vulnerability can be exploited remotely by an attacker with low privileges, such as a registered user, requiring low attack complexity and no user interaction. Successful exploitation enables limited confidentiality, integrity, and availability impacts through SQL injection, potentially allowing unauthorized data access, modification, or disruption within the chat system's database.
Advisories and references, including those from VulDB (ctiid.294359, id.294359) and a GitHub proof-of-concept at Team-intN18-SoybeanSeclab/CVE/sqlinject1.md, confirm the exploit has been publicly disclosed and may be used. The vendor site at code-projects.org provides additional context, though no specific patches or mitigations are detailed in the available information. Security practitioners should review these sources for updates and apply input validation or database query parameterization as general SQL injection defenses.
Details
- CWE(s)