A security vulnerability has been detected in code-projects E-Banking System 1.0. This affects an unknown function of the file /register.php of the component POST Parameter Handler. The manipulation of the argument username/password leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used.
History

Thu, 23 Oct 2025 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Fabian
Fabian simple E-banking System
CPEs cpe:2.3:a:fabianros:simple_e-banking_system:1.0:*:*:*:*:*:*:* cpe:2.3:a:fabian:simple_e-banking_system:1.0:*:*:*:*:*:*:*
Vendors & Products Fabianros
Fabianros simple E-banking System
Fabian
Fabian simple E-banking System

Tue, 21 Oct 2025 13:15:00 +0000

Type Values Removed Values Added
First Time appeared Code-projects
Code-projects e-banking System
Vendors & Products Code-projects
Code-projects e-banking System

Mon, 20 Oct 2025 18:15:00 +0000

Type Values Removed Values Added
First Time appeared Fabianros
Fabianros simple E-banking System
CPEs cpe:2.3:a:fabianros:simple_e-banking_system:1.0:*:*:*:*:*:*:*
Vendors & Products Fabianros
Fabianros simple E-banking System

Tue, 14 Oct 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 11 Oct 2025 17:15:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in code-projects E-Banking System 1.0. This affects an unknown function of the file /register.php of the component POST Parameter Handler. The manipulation of the argument username/password leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used.
Title code-projects E-Banking System POST Parameter register.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published: 2025-10-11T17:02:05.989Z

Updated: 2025-10-14T14:54:33.242Z

Reserved: 2025-10-10T13:54:15.587Z

Link: CVE-2025-11608

cve-icon Vulnrichment

Updated: 2025-10-14T14:48:13.060Z

cve-icon NVD

Status : Analyzed

Published: 2025-10-11T17:15:38.523

Modified: 2025-10-23T20:06:00.793

Link: CVE-2025-11608

cve-icon Redhat

No data.