CVE-2025-2389
Published: 17 March 2025
Summary
CVE-2025-2389 is a medium-severity Injection (CWE-74) vulnerability in Fabian Blood Bank Management System. Its CVSS base score is 4.7 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 35.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents SQL injection in /admin/add_city.php by validating and sanitizing user inputs before processing.
Requires remediation of the specific SQL injection flaw in Blood Bank Management System 1.0 through patching or code correction.
Implements boundary protection such as web application firewalls to filter and block SQL injection payloads targeting the remote /admin/add_city.php endpoint.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in /admin/add_city.php enables exploitation of a public-facing web application (T1190), abuse of server software components such as the backend database (T1505), and collection of data from databases (T1213.006) via unauthorized queries.
NVD Description
A vulnerability was found in code-projects Blood Bank Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/add_city.php. The manipulation leads to sql injection. The attack may be launched…
more
remotely. The exploit has been disclosed to the public and may be used.
Deeper analysisAI
CVE-2025-2389 is a critical SQL injection vulnerability (CWE-74, CWE-89) in code-projects Blood Bank Management System 1.0, published on 2025-03-17. The issue affects some unknown functionality in the file /admin/add_city.php, where manipulation leads to SQL injection that can be launched remotely.
Attackers with high privileges can exploit this vulnerability over the network with low attack complexity and no user interaction required, as indicated by its CVSS v3.1 base score of 4.7 (AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L). Successful exploitation enables limited impacts on confidentiality, integrity, and availability.
Advisories from VulDB (ctiid.299888, id.299888, submit.516906) and the project site at code-projects.org provide further details, along with a GitHub repository at intercpt/XSS1/blob/main/SQL7.md disclosing the exploit publicly for potential use. No specific patches or mitigations are detailed in the initial disclosure.
Details
- CWE(s)