Vulnerability Description
A weakness has been identified in code-projects Refugee Food Management System 1.0. This affects an unknown part of the file /home/editfood.php. This manipulation of the argument a/b/c/d causes sql injection. The attack may be initiated remotely. The exploit has been made available to the public and could be exploited.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Fabian | Refugee Food Management System | 1.0 |
Related Weaknesses (CWE)
References
- https://code-projects.org/Product
- https://github.com/YZS17/CVE/blob/main/Refugee%20Food_Management_System/sqli_ediExploitThird Party Advisory
- https://vuldb.com/?ctiid.338594Permissions RequiredVDB Entry
- https://vuldb.com/?id.338594VDB EntryThird Party Advisory
- https://vuldb.com/?submit.722803Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.724713Third Party AdvisoryVDB Entry
- https://github.com/YZS17/CVE/blob/main/Refugee%20Food_Management_System/sqli_ediExploitThird Party Advisory
FAQ
What is CVE-2025-15209?
CVE-2025-15209 is a vulnerability with a CVSS score of 6.3 (MEDIUM). A weakness has been identified in code-projects Refugee Food Management System 1.0. This affects an unknown part of the file /home/editfood.php. This manipulation of the argument a/b/c/d causes sql in...
How severe is CVE-2025-15209?
CVE-2025-15209 has been rated MEDIUM with a CVSS base score of 6.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-15209?
Check the references section above for vendor advisories and patch information. Affected products include: Fabian Refugee Food Management System.