CVE-2025-11585
Description
A vulnerability was found in code-projects Project Monitoring System 1.0. The impacted element is an unknown function of the file /useredit.php. The manipulation of the argument uid results in sql injection. The attack can be executed remotely. The exploit has been made public and could be used.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
SQL injection in Project Monitoring System 1.0 via uid parameter in /useredit.php allows remote unauthenticated attackers to execute arbitrary SQL commands, leading to data breach and system compromise.
Vulnerability
Overview
A SQL injection vulnerability exists in the Project Monitoring System version 1.0, specifically within the /useredit.php file. The root cause is the lack of proper sanitization or validation of the uid parameter, which is directly incorporated into SQL queries [1]. This allows an attacker to inject arbitrary SQL statements by manipulating the uid input.
Exploitation
Details
The attack can be performed remotely without any authentication or authorization [1]. An attacker sends a crafted POST request to /useredit.php with a malicious uid parameter. The exploit has been publicly disclosed, increasing the risk of widespread exploitation [1].
Impact
Successful exploitation enables an attacker to gain unauthorized access to the underlying database, leading to sensitive data leakage, data tampering, and potential full system compromise [1]. This poses a severe threat to the confidentiality, integrity, and availability of the system and its data.
Mitigation
Status
As of the publication date, no official patch or security update has been released by the vendor (code-projects.org) [2]. Users are advised to implement input validation and parameterized queries as a workaround, or consider migrating to an alternative solution.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: = 1.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/tiancesec/CVE/issues/8nvdExploitIssue TrackingThird Party Advisory
- vuldb.comnvdThird Party AdvisoryVDB Entry
- vuldb.comnvdThird Party AdvisoryVDB Entry
- code-projects.orgnvdProduct
- vuldb.comnvdPermissions RequiredVDB Entry
News mentions
0No linked articles in our index yet.