A security vulnerability has been detected in code-projects E-Banking System 1.0. This affects an unknown function of the file /register.php of the component POST Parameter Handler. The manipulation of the argument username/password leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used.
References
| Link | Resource |
|---|---|
| https://code-projects.org/ | Product |
| https://github.com/lakshayyverma/CVE-Discovery/blob/main/E-Banking%20System%20SQLi.md | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.327930 | Permissions Required VDB Entry |
| https://vuldb.com/?id.327930 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.672559 | Third Party Advisory VDB Entry |
| https://github.com/lakshayyverma/CVE-Discovery/blob/main/E-Banking%20System%20SQLi.md | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-10-11 17:15
Updated : 2025-10-23 20:06
NVD link : CVE-2025-11608
Mitre link : CVE-2025-11608
CVE.ORG link : CVE-2025-11608
JSON object : View
Products Affected
fabian
- simple_e-banking_system
