CVE-2025-7184

A vulnerability was found in code-projects Library System 1.0. It has been classified as critical. This affects an unknown part of the file /user/teacher/books.php. The manipulation of the argument Search leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
References
Link Resource
https://code-projects.org/ Product
https://github.com/HeDunSec/cve/issues/2 Exploit Third Party Advisory Issue Tracking
https://vuldb.com/?ctiid.315123 Permissions Required
https://vuldb.com/?id.315123 Third Party Advisory VDB Entry
https://vuldb.com/?submit.607185 Third Party Advisory VDB Entry
https://github.com/HeDunSec/cve/issues/2 Exploit Third Party Advisory Issue Tracking
Configurations

Configuration 1 (hide)

cpe:2.3:a:code-projects:library_system:1.0:*:*:*:*:*:*:*

History

09 Jul 2025, 13:46

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-08 16:15

Updated : 2025-07-09 13:46


NVD link : CVE-2025-7184

Mitre link : CVE-2025-7184

CVE.ORG link : CVE-2025-7184


JSON object : View

Products Affected

code-projects

  • library_system
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')