CVE-2025-3038
Published: 31 March 2025
Summary
CVE-2025-3038 is a medium-severity Injection (CWE-74) vulnerability in Fabian Payroll Management System. Its CVSS base score is 6.3 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 32.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents SQL injection by validating the salary_rate parameter in /view_account.php against malicious inputs.
Requires timely remediation of the SQL injection flaw in Payroll Management System 1.0 to eliminate the vulnerability.
Limits database privileges for the application process to minimize impacts from successful salary_rate SQL injection exploitation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in public-facing web application (/view_account.php) enables initial access via exploitation of public-facing application (T1190) and facilitates unauthorized data collection from backend databases (T1213.006).
NVD Description
A vulnerability was found in code-projects Payroll Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /view_account.php. The manipulation of the argument salary_rate leads to sql injection. The attack may be initiated remotely.…
more
The exploit has been disclosed to the public and may be used.
Deeper analysisAI
CVE-2025-3038 is a critical SQL injection vulnerability in code-projects Payroll Management System 1.0, affecting the processing of the /view_account.php file. The issue arises from improper handling of the salary_rate argument, allowing manipulation that leads to SQL injection (CWE-74, CWE-89). It carries a CVSS v3.1 base score of 6.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L) and was published on 2025-03-31.
The vulnerability can be exploited remotely by an attacker with low privileges, requiring low complexity and no user interaction. Successful exploitation enables limited impacts on confidentiality, integrity, and availability through SQL injection, potentially allowing unauthorized data access, modification, or disruption within the affected application's database.
Advisories from sources like VulDB (ctiid.302099, id.302099) and a GitHub repository document the issue, noting that the exploit has been publicly disclosed and may be used. No specific patches or mitigations are detailed in the available references; security practitioners should monitor the vendor site at code-projects.org for updates and apply input validation or parameterized queries to /view_account.php as interim defenses.
Details
- CWE(s)