VYPR
High severity7.3NVD Advisory· Published Sep 27, 2025· Updated Apr 29, 2026

CVE-2025-11074

CVE-2025-11074

Description

A flaw has been found in code-projects Project Monitoring System 1.0. The impacted element is an unknown function of the file /login.php. This manipulation of the argument username/password causes sql injection. The attack may be initiated remotely. The exploit has been published and may be used.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

CVE-2025-11074 describes a remotely exploitable SQL injection vulnerability in code-projects Project Monitoring System 1.0 via the login.php username and password parameters.

Vulnerability

Analysis

CVE-2025-11074 is a SQL injection flaw in code-projects Project Monitoring System 1.0, specifically within the /login.php file. The root cause is the direct concatenation of user-supplied username and password parameters into SQL queries without proper sanitization or parameterization [1]. This allows an attacker to inject arbitrary SQL commands.

Exploitation

The attack can be initiated remotely without authentication, as the login page is publicly accessible [1]. A malicious HTTP POST request to /project/pmmp/login.php?action=login with crafted values in the username and password fields can trigger the injection. A public proof-of-concept (PoC) demonstrates retrieving database information via a simple payload [1]. The vulnerability can be exploited with standard HTTP tools, requiring no special network position beyond network access to the application.

Impact

Successful exploitation enables an attacker to manipulate backend SQL queries, potentially leading to unauthorized data access, credential retrieval, or escalation to server compromise [1]. As the PoC shows, database enumeration is possible, which could expose sensitive user data or application secrets.

Mitigation

As of publication, the vendor (code-projects) has not released a patch [2]. The application source code is available, but no advisory or fix has been issued. Until a patch is applied, input validation and prepared statements should be implemented, and the system should be isolated if exposed to untrusted networks.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.