Skip to main content

CVE-2025-6474: SQL Injection in code-projects Inventory Management System

Medium
VulnerabilityCVE-2025-6474cvecve-2025-6474
Published: Sun Jun 22 2025 (06/22/2025, 11:31:06 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Inventory Management System

Description

A vulnerability has been found in code-projects Inventory Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /changeUsername.php. The manipulation of the argument user_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 06/22/2025, 12:04:36 UTC

Technical Analysis

CVE-2025-6474 is a critical SQL Injection vulnerability identified in version 1.0 of the code-projects Inventory Management System, specifically within the /changeUsername.php endpoint. The vulnerability arises from improper sanitization or validation of the 'user_id' parameter, which can be manipulated by an attacker to inject malicious SQL code. This injection flaw allows an unauthenticated remote attacker to execute arbitrary SQL commands on the backend database without requiring any user interaction or privileges. The vulnerability is classified with a CVSS 4.0 base score of 6.9 (medium severity), reflecting its network attack vector, low attack complexity, no privileges or user interaction needed, but with limited impact on confidentiality, integrity, and availability. Although no known exploits are currently observed in the wild, the public disclosure of the vulnerability increases the risk of exploitation. The vulnerability could lead to unauthorized data access, modification, or deletion, potentially compromising sensitive inventory data and user information. The lack of authentication and user interaction requirements makes this vulnerability particularly dangerous in internet-facing deployments of the affected system. The absence of official patches or mitigation guidance from the vendor at this time further exacerbates the risk for organizations using this software version.

Potential Impact

For European organizations utilizing the code-projects Inventory Management System 1.0, this vulnerability poses a significant risk to the confidentiality and integrity of their inventory and user data. Successful exploitation could result in unauthorized disclosure of sensitive business information, manipulation of inventory records, or disruption of inventory management operations. This could lead to financial losses, regulatory non-compliance (especially under GDPR due to potential exposure of personal data), and reputational damage. Organizations in sectors such as retail, manufacturing, and logistics that rely heavily on inventory management systems are particularly vulnerable. The remote and unauthenticated nature of the exploit increases the attack surface, especially for organizations with internet-exposed instances of the affected software. Additionally, the potential for attackers to pivot from compromised inventory systems to other internal resources could amplify the overall impact on organizational security.

Mitigation Recommendations

Given the absence of official patches, European organizations should immediately implement compensating controls. These include: 1) Restricting network access to the /changeUsername.php endpoint by implementing strict firewall rules or web application firewall (WAF) policies to block or monitor suspicious SQL injection patterns targeting the 'user_id' parameter. 2) Employing input validation and parameterized queries or prepared statements at the application layer if source code access is available, to sanitize user inputs effectively. 3) Conducting thorough code audits and penetration testing focused on SQL injection vectors within the Inventory Management System. 4) Monitoring database logs and application logs for anomalous queries or failed login attempts that may indicate exploitation attempts. 5) Isolating the Inventory Management System in a segmented network zone to limit lateral movement in case of compromise. 6) Planning and prioritizing an upgrade or patch deployment once the vendor releases a fix. 7) Educating IT and security teams about the vulnerability to ensure rapid detection and response. These targeted measures go beyond generic advice by focusing on the specific vulnerable endpoint and attack vector.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-06-21T05:29:06.467Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6857edc9179a4edd60b456a4

Added to database: 6/22/2025, 11:49:29 AM

Last enriched: 6/22/2025, 12:04:36 PM

Last updated: 8/21/2025, 2:29:44 PM

Views: 46

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats