Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15408: SQL Injection in code-projects Online Guitar Store

0
Medium
VulnerabilityCVE-2025-15408cvecve-2025-15408
Published: Thu Jan 01 2026 (01/01/2026, 18:02:06 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Online Guitar Store

Description

A vulnerability was found in code-projects Online Guitar Store 1.0. Affected is an unknown function of the file /admin/Create_product.php. Performing manipulation of the argument dre_title results in sql injection. The attack is possible to be carried out remotely. The exploit has been made public and could be used.

AI-Powered Analysis

AILast updated: 01/01/2026, 18:44:26 UTC

Technical Analysis

CVE-2025-15408 identifies a SQL Injection vulnerability in the Online Guitar Store 1.0 product by code-projects, located in the /admin/Create_product.php file. The vulnerability arises from improper sanitization of the dre_title parameter, allowing attackers to inject arbitrary SQL commands. This flaw can be exploited remotely without authentication or user interaction, enabling attackers to manipulate backend database queries. Potential consequences include unauthorized data disclosure, data modification, or even full database compromise depending on the database privileges of the web application. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P) reflects a medium severity rating of 6.9, highlighting that while the attack vector is network-based and requires no privileges or interaction, the impact on confidentiality, integrity, and availability is limited to low or partial. No official patches or fixes have been published yet, and no known exploits are observed in the wild, though a public exploit has been made available. The vulnerability is critical to address in environments where the Online Guitar Store software is used, especially in administrative modules that manage product data. The lack of authentication requirement increases the risk profile, making it easier for attackers to exploit if the admin interface is exposed to the internet.

Potential Impact

For European organizations using the Online Guitar Store 1.0 platform, this vulnerability poses a risk of unauthorized access to sensitive product and possibly customer data stored in the backend database. Attackers could manipulate product listings, inject malicious data, or extract confidential information, potentially leading to reputational damage, financial loss, and regulatory non-compliance under GDPR. The impact is particularly significant for small and medium-sized retailers who may lack robust security controls or dedicated IT security teams. Additionally, if the compromised database contains customer payment or personal information, this could escalate to severe privacy breaches. The vulnerability's remote and unauthenticated nature increases the attack surface, especially if the admin interface is accessible externally. This could also serve as a foothold for further attacks within the network. While no widespread exploitation is currently reported, the availability of a public exploit increases the urgency for mitigation.

Mitigation Recommendations

1. Immediately restrict access to the /admin/Create_product.php endpoint by implementing network-level controls such as IP whitelisting or VPN access to limit exposure to trusted personnel only. 2. Conduct a thorough code review of the affected parameter (dre_title) and replace any dynamic SQL query construction with parameterized queries or prepared statements to prevent injection. 3. Implement robust input validation and sanitization on all user-supplied data, especially in administrative interfaces. 4. Monitor web server and database logs for suspicious activities related to the dre_title parameter or unusual SQL errors. 5. If possible, upgrade to a newer, patched version of the software once available or apply vendor-provided patches promptly. 6. Employ Web Application Firewalls (WAF) with custom rules to detect and block SQL injection attempts targeting this endpoint. 7. Educate administrative users about the risks of exposing admin interfaces publicly and enforce strong authentication and session management controls. 8. Regularly back up databases and verify the integrity of backups to enable recovery in case of data tampering.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-01T08:50:14.974Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6956bce0db813ff03e75fde8

Added to database: 1/1/2026, 6:28:48 PM

Last enriched: 1/1/2026, 6:44:26 PM

Last updated: 1/7/2026, 4:14:42 AM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats