CVE-2025-69563
Published: 27 January 2026
Summary
CVE-2025-69563 is a critical-severity SQL Injection (CWE-89) vulnerability in Fabian Mobile Shop Management System. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 15.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Information Input Validation directly prevents SQL injection by requiring validation and sanitization of the untrusted Password parameter before database queries in /ExLogin.php.
Flaw Remediation mandates identifying, prioritizing, and patching the specific SQL injection vulnerability in the Mobile Shop Management System's /ExLogin.php.
Boundary Protection enables web application firewalls or proxies to inspect and block SQL injection payloads targeting the Password parameter at the network boundary.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Unauthenticated SQL injection in public-facing web app (/ExLogin.php) directly enables remote exploitation of the application.
NVD Description
code-projects Mobile Shop Management System 1.0 is vulnerable to SQL Injection in /ExLogin.php via the Password parameter.
Deeper analysisAI
CVE-2025-69563 is a SQL injection vulnerability (CWE-89) in the code-projects Mobile Shop Management System version 1.0. The flaw resides in the /ExLogin.php component and is triggered via the Password parameter. Published on 2026-01-27, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), marking it as critical due to its potential for severe impact.
Unauthenticated attackers can exploit this vulnerability remotely over the network with low attack complexity and no user interaction required. Successful exploitation enables high confidentiality, integrity, and availability impacts, allowing attackers to manipulate the backend database, extract sensitive data, modify records, or disrupt system operations.
Advisories referencing mitigation are available at https://gist.github.com/lih28984-commits/544eaaca3ea58563a807c43b521d76e6 and https://gitee.com/Z_180yc/zyy/issues/IDC3IB.
Details
- CWE(s)