A weakness has been identified in code-projects Online Course Registration 1.0. This impacts an unknown function of the file /admin/edit-course.php. Executing manipulation of the argument coursecode can lead to sql injection. The attack can be executed remotely. The exploit has been made available to the public and could be exploited.
Advisories
Source ID Title
EUVD EUVD EUVD-2025-32556 A weakness has been identified in code-projects Online Course Registration 1.0. This impacts an unknown function of the file /admin/edit-course.php. Executing manipulation of the argument coursecode can lead to sql injection. The attack can be executed remotely. The exploit has been made available to the public and could be exploited.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 14 Oct 2025 15:45:00 +0000

Type Values Removed Values Added
First Time appeared Fabian
Fabian online Course Registration Site
CPEs cpe:2.3:a:fabian:online_course_registration_site:1.0:*:*:*:*:*:*:*
Vendors & Products Fabian
Fabian online Course Registration Site

Wed, 08 Oct 2025 13:45:00 +0000

Type Values Removed Values Added
First Time appeared Code-projects
Code-projects online Course Registration
Vendors & Products Code-projects
Code-projects online Course Registration

Mon, 06 Oct 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 06 Oct 2025 17:45:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in code-projects Online Course Registration 1.0. This impacts an unknown function of the file /admin/edit-course.php. Executing manipulation of the argument coursecode can lead to sql injection. The attack can be executed remotely. The exploit has been made available to the public and could be exploited.
Title code-projects Online Course Registration edit-course.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 5.8, 'vector': 'AV:N/AC:L/Au:M/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.7, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2025-10-06T19:57:13.571Z

Reserved: 2025-10-06T06:06:59.540Z

Link: CVE-2025-11342

cve-icon Vulnrichment

Updated: 2025-10-06T19:57:10.773Z

cve-icon NVD

Status : Analyzed

Published: 2025-10-06T18:15:50.697

Modified: 2025-10-14T15:43:59.247

Link: CVE-2025-11342

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-10-08T13:38:49Z