First published: Mon Mar 17 2025(Updated: )
A vulnerability, which was classified as critical, has been found in code-projects Online Class and Exam Scheduling System 1.0. This issue affects some unknown processing of the file /pages/activate.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
code-projects Online Class and Exam Scheduling System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-2392 is classified as critical due to its potential for SQL injection vulnerabilities.
To fix CVE-2025-2392, implement proper input validation and parameterized queries in the /pages/activate.php file.
CVE-2025-2392 affects Code-projects Online Class and Exam Scheduling System version 1.0.
CVE-2025-2392 can be exploited through SQL injection attacks targeting the id parameter.
Currently, there is no specific patch available for CVE-2025-2392; users should apply manual code changes as a workaround.