CVE-2025-7197: SQL Injection in code-projects Jonnys Liquor
A vulnerability classified as critical has been found in code-projects Jonnys Liquor 1.0. This affects an unknown part of the file /admin/delete-row.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-7197 is a SQL Injection vulnerability identified in version 1.0 of the code-projects product named Jonnys Liquor. The vulnerability exists in the /admin/delete-row.php file, specifically through improper handling of the 'ID' parameter. An attacker can remotely manipulate this parameter to inject malicious SQL code, potentially allowing unauthorized access to or modification of the backend database. The vulnerability does not require any authentication or user interaction, making it remotely exploitable over the network. The CVSS 4.0 base score is 6.9, indicating a medium severity level. The vector details (AV:N/AC:L/AT:N/PR:N/UI:N) confirm that the attack can be launched remotely without privileges or user interaction. The impact on confidentiality, integrity, and availability is rated low individually, but collectively they contribute to the overall medium severity. No patches or mitigations have been published yet, and there are no known exploits in the wild at the time of disclosure. The vulnerability's presence in an administrative script suggests that successful exploitation could lead to unauthorized deletion or modification of database records, potentially disrupting business operations or exposing sensitive data.
Potential Impact
For European organizations using Jonnys Liquor 1.0, this vulnerability poses a significant risk. Since the flaw allows remote SQL injection without authentication, attackers could compromise the integrity and confidentiality of business-critical data stored in the backend database. This could lead to unauthorized data disclosure, data tampering, or deletion of records, which may disrupt operations, damage reputation, and lead to regulatory non-compliance under GDPR if personal data is involved. The administrative nature of the vulnerable endpoint increases the risk of impactful data manipulation. Additionally, the public disclosure of the vulnerability increases the likelihood of exploitation attempts, especially against unpatched systems. Organizations relying on this software for inventory, sales, or customer management should be particularly vigilant. The medium CVSS score suggests moderate risk, but the lack of authentication and remote exploitability elevate the threat level in practical scenarios.
Mitigation Recommendations
Given the absence of an official patch, European organizations should implement immediate compensating controls. These include restricting network access to the /admin/delete-row.php endpoint via firewall rules or VPN-only access to limit exposure. Input validation and parameterized queries should be implemented to sanitize the 'ID' parameter, preventing injection attacks. If source code access is available, developers should refactor the vulnerable code to use prepared statements or stored procedures. Monitoring and logging of database queries and web server access should be enhanced to detect suspicious activity. Organizations should also conduct thorough audits of database integrity and backups to enable recovery in case of data manipulation. Finally, organizations should track vendor updates closely and apply official patches as soon as they become available.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-7197: SQL Injection in code-projects Jonnys Liquor
Description
A vulnerability classified as critical has been found in code-projects Jonnys Liquor 1.0. This affects an unknown part of the file /admin/delete-row.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-7197 is a SQL Injection vulnerability identified in version 1.0 of the code-projects product named Jonnys Liquor. The vulnerability exists in the /admin/delete-row.php file, specifically through improper handling of the 'ID' parameter. An attacker can remotely manipulate this parameter to inject malicious SQL code, potentially allowing unauthorized access to or modification of the backend database. The vulnerability does not require any authentication or user interaction, making it remotely exploitable over the network. The CVSS 4.0 base score is 6.9, indicating a medium severity level. The vector details (AV:N/AC:L/AT:N/PR:N/UI:N) confirm that the attack can be launched remotely without privileges or user interaction. The impact on confidentiality, integrity, and availability is rated low individually, but collectively they contribute to the overall medium severity. No patches or mitigations have been published yet, and there are no known exploits in the wild at the time of disclosure. The vulnerability's presence in an administrative script suggests that successful exploitation could lead to unauthorized deletion or modification of database records, potentially disrupting business operations or exposing sensitive data.
Potential Impact
For European organizations using Jonnys Liquor 1.0, this vulnerability poses a significant risk. Since the flaw allows remote SQL injection without authentication, attackers could compromise the integrity and confidentiality of business-critical data stored in the backend database. This could lead to unauthorized data disclosure, data tampering, or deletion of records, which may disrupt operations, damage reputation, and lead to regulatory non-compliance under GDPR if personal data is involved. The administrative nature of the vulnerable endpoint increases the risk of impactful data manipulation. Additionally, the public disclosure of the vulnerability increases the likelihood of exploitation attempts, especially against unpatched systems. Organizations relying on this software for inventory, sales, or customer management should be particularly vigilant. The medium CVSS score suggests moderate risk, but the lack of authentication and remote exploitability elevate the threat level in practical scenarios.
Mitigation Recommendations
Given the absence of an official patch, European organizations should implement immediate compensating controls. These include restricting network access to the /admin/delete-row.php endpoint via firewall rules or VPN-only access to limit exposure. Input validation and parameterized queries should be implemented to sanitize the 'ID' parameter, preventing injection attacks. If source code access is available, developers should refactor the vulnerable code to use prepared statements or stored procedures. Monitoring and logging of database queries and web server access should be enhanced to detect suspicious activity. Organizations should also conduct thorough audits of database integrity and backups to enable recovery in case of data manipulation. Finally, organizations should track vendor updates closely and apply official patches as soon as they become available.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-07-07T08:45:45.623Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 686d90126f40f0eb72fbad75
Added to database: 7/8/2025, 9:39:30 PM
Last enriched: 7/15/2025, 9:55:25 PM
Last updated: 8/12/2025, 9:02:24 AM
Views: 26
Related Threats
CVE-2025-36088: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in IBM Storage TS4500 Library
MediumCVE-2025-43490: CWE-59 Improper Link Resolution Before File Access ('Link Following') in HP, Inc. HP Hotkey Support Software
MediumCVE-2025-9060: CWE-20 Improper Input Validation in MSoft MFlash
CriticalCVE-2025-8675: CWE-918 Server-Side Request Forgery (SSRF) in Drupal AI SEO Link Advisor
MediumCVE-2025-8362: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Drupal GoogleTag Manager
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.