CVE-2025-11608

A security vulnerability has been detected in code-projects E-Banking System 1.0. This affects an unknown function of the file /register.php of the component POST Parameter Handler. The manipulation of the argument username/password leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used.
Configurations

Configuration 1 (hide)

cpe:2.3:a:fabianros:simple_e-banking_system:1.0:*:*:*:*:*:*:*

History

20 Oct 2025, 18:09

Type Values Removed Values Added
References () https://code-projects.org/ - () https://code-projects.org/ - Product
References () https://github.com/lakshayyverma/CVE-Discovery/blob/main/E-Banking%20System%20SQLi.md - () https://github.com/lakshayyverma/CVE-Discovery/blob/main/E-Banking%20System%20SQLi.md - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.327930 - () https://vuldb.com/?ctiid.327930 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.327930 - () https://vuldb.com/?id.327930 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.672559 - () https://vuldb.com/?submit.672559 - Third Party Advisory, VDB Entry
First Time Fabianros simple E-banking System
Fabianros
CPE cpe:2.3:a:fabianros:simple_e-banking_system:1.0:*:*:*:*:*:*:*

14 Oct 2025, 15:16

Type Values Removed Values Added
References () https://github.com/lakshayyverma/CVE-Discovery/blob/main/E-Banking%20System%20SQLi.md - () https://github.com/lakshayyverma/CVE-Discovery/blob/main/E-Banking%20System%20SQLi.md -

11 Oct 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-10-11 17:15

Updated : 2025-10-20 18:09


NVD link : CVE-2025-11608

Mitre link : CVE-2025-11608

CVE.ORG link : CVE-2025-11608


JSON object : View

Products Affected

fabianros

  • simple_e-banking_system
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')