CVE-2025-7166: SQL Injection in code-projects Responsive Blog Site
A vulnerability was found in code-projects Responsive Blog Site 1.0. It has been classified as critical. This affects an unknown part of the file /single.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-7166 is a SQL Injection vulnerability identified in version 1.0 of the code-projects Responsive Blog Site, specifically within the /single.php file. The vulnerability arises from improper sanitization or validation of the 'ID' parameter, which is used in SQL queries. An attacker can remotely manipulate this parameter to inject malicious SQL code, potentially allowing unauthorized access to the backend database. This can lead to unauthorized data disclosure, data modification, or even complete compromise of the database server. The vulnerability does not require user interaction and can be exploited over the network without authentication, increasing its risk profile. However, the CVSS 4.0 base score is 5.3 (medium severity), reflecting limited impact on confidentiality, integrity, and availability, and the requirement for low privileges (PR:L). The exploit has been publicly disclosed but there are no known exploits actively used in the wild at this time. The vulnerability affects only version 1.0 of the Responsive Blog Site product, which is a web-based blogging platform. The lack of available patches or mitigations at the time of publication increases the urgency for affected users to implement compensating controls or upgrade when possible.
Potential Impact
For European organizations using the code-projects Responsive Blog Site 1.0, this vulnerability poses a risk of unauthorized access to sensitive data stored in the blog site's database, including potentially user information, blog content, and administrative data. Exploitation could lead to data breaches, defacement of websites, or use of the compromised site as a pivot point for further attacks within the organization's network. Given the medium CVSS score, the impact on confidentiality and integrity is limited but non-negligible, especially if the blog site is integrated with other internal systems or contains sensitive information. Availability impact is low, but attackers could still disrupt services by manipulating database queries. European organizations with public-facing blogs or content management systems based on this product should be particularly vigilant, as the vulnerability can be exploited remotely without authentication or user interaction. The public disclosure of the exploit increases the risk of opportunistic attacks, especially against organizations slow to patch or mitigate the issue.
Mitigation Recommendations
Since no official patches are currently available, European organizations should immediately implement the following specific mitigations: 1) Apply Web Application Firewall (WAF) rules to detect and block SQL injection patterns targeting the 'ID' parameter in /single.php requests. 2) Restrict database user permissions associated with the blog site to the minimum necessary, preventing unauthorized data modification or extraction. 3) Conduct thorough input validation and sanitization on all user-supplied parameters, especially 'ID', to prevent injection attacks. 4) Monitor web server and database logs for unusual query patterns or repeated failed attempts targeting the vulnerable parameter. 5) If feasible, isolate the blog site in a segmented network zone to limit lateral movement in case of compromise. 6) Plan and prioritize upgrading to a patched or newer version of the Responsive Blog Site once available. 7) Educate web administrators about the vulnerability and encourage rapid incident response readiness.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-7166: SQL Injection in code-projects Responsive Blog Site
Description
A vulnerability was found in code-projects Responsive Blog Site 1.0. It has been classified as critical. This affects an unknown part of the file /single.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-7166 is a SQL Injection vulnerability identified in version 1.0 of the code-projects Responsive Blog Site, specifically within the /single.php file. The vulnerability arises from improper sanitization or validation of the 'ID' parameter, which is used in SQL queries. An attacker can remotely manipulate this parameter to inject malicious SQL code, potentially allowing unauthorized access to the backend database. This can lead to unauthorized data disclosure, data modification, or even complete compromise of the database server. The vulnerability does not require user interaction and can be exploited over the network without authentication, increasing its risk profile. However, the CVSS 4.0 base score is 5.3 (medium severity), reflecting limited impact on confidentiality, integrity, and availability, and the requirement for low privileges (PR:L). The exploit has been publicly disclosed but there are no known exploits actively used in the wild at this time. The vulnerability affects only version 1.0 of the Responsive Blog Site product, which is a web-based blogging platform. The lack of available patches or mitigations at the time of publication increases the urgency for affected users to implement compensating controls or upgrade when possible.
Potential Impact
For European organizations using the code-projects Responsive Blog Site 1.0, this vulnerability poses a risk of unauthorized access to sensitive data stored in the blog site's database, including potentially user information, blog content, and administrative data. Exploitation could lead to data breaches, defacement of websites, or use of the compromised site as a pivot point for further attacks within the organization's network. Given the medium CVSS score, the impact on confidentiality and integrity is limited but non-negligible, especially if the blog site is integrated with other internal systems or contains sensitive information. Availability impact is low, but attackers could still disrupt services by manipulating database queries. European organizations with public-facing blogs or content management systems based on this product should be particularly vigilant, as the vulnerability can be exploited remotely without authentication or user interaction. The public disclosure of the exploit increases the risk of opportunistic attacks, especially against organizations slow to patch or mitigate the issue.
Mitigation Recommendations
Since no official patches are currently available, European organizations should immediately implement the following specific mitigations: 1) Apply Web Application Firewall (WAF) rules to detect and block SQL injection patterns targeting the 'ID' parameter in /single.php requests. 2) Restrict database user permissions associated with the blog site to the minimum necessary, preventing unauthorized data modification or extraction. 3) Conduct thorough input validation and sanitization on all user-supplied parameters, especially 'ID', to prevent injection attacks. 4) Monitor web server and database logs for unusual query patterns or repeated failed attempts targeting the vulnerable parameter. 5) If feasible, isolate the blog site in a segmented network zone to limit lateral movement in case of compromise. 6) Plan and prioritize upgrading to a patched or newer version of the Responsive Blog Site once available. 7) Educate web administrators about the vulnerability and encourage rapid incident response readiness.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-07-07T07:00:48.812Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 686cc0a16f40f0eb72f236e4
Added to database: 7/8/2025, 6:54:25 AM
Last enriched: 7/8/2025, 7:09:45 AM
Last updated: 1/7/2026, 6:08:00 AM
Views: 88
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14835: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in opajaap WP Photo Album Plus
HighCVE-2026-0650: CWE-306 Missing Authentication for Critical Function in OpenFlagr Flagr
CriticalCVE-2025-15474: CWE-770 Allocation of Resources Without Limits or Throttling in AuntyFey AuntyFey Smart Combination Lock
MediumCVE-2025-14468: CWE-352 Cross-Site Request Forgery (CSRF) in mohammed_kaludi AMP for WP – Accelerated Mobile Pages
MediumCVE-2025-9611: CWE-749 Exposed Dangerous Method or Function in Microsoft Playwright
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.