Skip to main content

CVE-2025-7178: SQL Injection in code-projects Food Distributor Site

Medium
VulnerabilityCVE-2025-7178cvecve-2025-7178
Published: Tue Jul 08 2025 (07/08/2025, 12:32:05 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Food Distributor Site

Description

A vulnerability classified as critical has been found in code-projects Food Distributor Site 1.0. This affects an unknown part of the file /admin/login.php. The manipulation of the argument Username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/08/2025, 12:54:33 UTC

Technical Analysis

CVE-2025-7178 is a critical SQL Injection vulnerability identified in version 1.0 of the code-projects Food Distributor Site, specifically within the /admin/login.php file. The vulnerability arises from improper sanitization or validation of the 'Username' parameter, allowing an attacker to inject malicious SQL code remotely without any authentication or user interaction. This flaw enables an attacker to manipulate backend database queries, potentially leading to unauthorized data access, data modification, or even full database compromise. The CVSS 4.0 base score is 6.9, indicating a medium severity level, reflecting the ease of exploitation (network accessible, no privileges or user interaction required) but limited impact on confidentiality, integrity, and availability (each rated low). Although no known exploits are currently observed in the wild, the public disclosure of the vulnerability increases the risk of exploitation. The vulnerability affects only version 1.0 of the Food Distributor Site, a web application used for managing food distribution operations, likely involving sensitive business and customer data. The lack of available patches or mitigations from the vendor further elevates the risk for organizations using this software. Given the vulnerability is in the admin login page, successful exploitation could allow attackers to bypass authentication or escalate privileges, severely impacting the affected system's security posture.

Potential Impact

For European organizations using the code-projects Food Distributor Site 1.0, this vulnerability poses a significant risk to the confidentiality and integrity of their operational and customer data. Exploitation could lead to unauthorized access to administrative functions, enabling attackers to manipulate orders, customer information, or financial data. This can disrupt supply chain operations, cause financial losses, and damage organizational reputation. Additionally, compromised systems could be leveraged to launch further attacks within the network or serve as a foothold for ransomware or data exfiltration campaigns. Given the critical nature of food distribution in supply chains, any disruption could have cascading effects on food availability and business continuity. The absence of patches means organizations must rely on immediate mitigation strategies to reduce exposure. Furthermore, regulatory compliance requirements such as GDPR impose strict obligations on protecting personal data, and exploitation of this vulnerability could lead to significant legal and financial penalties for European entities.

Mitigation Recommendations

Organizations should immediately implement the following specific mitigations: 1) Apply input validation and parameterized queries or prepared statements in the /admin/login.php script to prevent SQL injection. If source code modification is not feasible immediately, deploy a Web Application Firewall (WAF) with custom rules to detect and block SQL injection attempts targeting the 'Username' parameter. 2) Restrict access to the /admin/login.php endpoint by IP whitelisting or VPN-only access to limit exposure to trusted networks. 3) Monitor web server and application logs for suspicious login attempts or unusual query patterns indicative of SQL injection. 4) Conduct a thorough security audit of the Food Distributor Site installation to identify any signs of compromise. 5) Engage with the vendor or community to obtain or develop patches or updates addressing this vulnerability. 6) As a longer-term measure, consider migrating to a more secure and actively maintained food distribution platform. 7) Ensure regular backups of critical data are performed and stored securely to enable recovery in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-07T07:58:06.419Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 686d11806f40f0eb72f5009d

Added to database: 7/8/2025, 12:39:28 PM

Last enriched: 7/8/2025, 12:54:33 PM

Last updated: 7/15/2025, 6:53:21 AM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats