VYPR
High severity7.3NVD Advisory· Published Oct 11, 2025· Updated Apr 29, 2026

CVE-2025-11608

CVE-2025-11608

Description

A security vulnerability has been detected in code-projects E-Banking System 1.0. This affects an unknown function of the file /register.php of the component POST Parameter Handler. The manipulation of the argument username/password leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A blind SQL injection vulnerability in code-projects E-Banking System 1.0 allows unauthenticated remote attackers to extract sensitive data via crafted username/password parameters.

Vulnerability

Overview

A security flaw was discovered in the code-projects E-Banking System version 1.0 within the register.php script. The POST Parameter Handler fails to sanitize user supplied input for the username and password arguments, leading to SQL injection. The issue stems from insufficient validation or escaping of these parameters before inclusion in database queries.

Exploitation

Details

The attack is remotely exploitable without requiring authentication. An attacker can manipulate the username or password fields to inject arbitrary SQL statements. The exploit is publicly available, lowering the barrier for potential exploitation. Because the endpoint is the registration page, it is accessible from the internet in typical deployments, increasing the likelihood of targeting.

Impact

Successful exploitation could allow an attacker to retrieve sensitive data from the database, such as user credentials, personal information, or financial records. Depending on database privileges, an attacker might also be able to modify or delete data. Given the CVSS v3 base score of 7.3 (High), the vulnerability poses a significant risk to the confidentiality, integrity, and availability of the system [1].

Mitigation

Status

At the time of disclosure, no official patch has been released by code-projects for version 1.0. Users are advised to apply strict input validation on all POST parameters, use parameterized queries, and consider disabling the registration page if not required. Organizations should evaluate their exposure and implement virtual patching or Web Application Firewall (WAF) rules to block injection attempts.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.