A weakness has been identified in code-projects Question Paper Generator 1.0. This affects an unknown part of the file /signupscript.php of the component POST Parameter Handler. Executing manipulation of the argument Fname can lead to sql injection. The attack can be executed remotely. The exploit has been made available to the public and could be exploited.
References
| Link | Resource |
|---|---|
| https://code-projects.org/ | Product |
| https://github.com/rassec2/dbcve/issues/6 | Exploit Issue Tracking Third Party Advisory |
| https://vuldb.com/?ctiid.333347 | Permissions Required VDB Entry |
| https://vuldb.com/?id.333347 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.699591 | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2025-11-24 05:15
Updated : 2025-12-02 03:11
NVD link : CVE-2025-13583
Mitre link : CVE-2025-13583
CVE.ORG link : CVE-2025-13583
JSON object : View
Products Affected
carmelo
- question_paper_generator
