CVE-2025-0967
Published: 02 February 2025
Description
A vulnerability was found in code-projects Chat System 1.0 and classified as critical. This issue affects some unknown processing of the file /user/add_chatroom.php. The manipulation of the argument chatname/chatpass leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Security Summary
CVE-2025-0967 is a critical SQL injection vulnerability in code-projects Chat System 1.0, affecting the processing of the file /user/add_chatroom.php. The issue arises from improper handling of the chatname and chatpass arguments, allowing manipulation that leads to SQL injection as classified under CWE-74 and CWE-89. It carries a CVSS v3.1 base score of 6.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L) and was published on 2025-02-02.
The vulnerability can be exploited remotely by an attacker with low privileges, such as a registered user, requiring low attack complexity and no user interaction. Successful exploitation enables limited confidentiality, integrity, and availability impacts through SQL injection, potentially allowing unauthorized data access, modification, or disruption within the chat system's database.
Advisories and references, including those from VulDB (ctiid.294359, id.294359) and a GitHub proof-of-concept at Team-intN18-SoybeanSeclab/CVE/sqlinject1.md, confirm the exploit has been publicly disclosed and may be used. The vendor site at code-projects.org provides additional context, though no specific patches or mitigations are detailed in the available information. Security practitioners should review these sources for updates and apply input validation or database query parameterization as general SQL injection defenses.
Details
- CWE(s)