Skip to main content

CVE-2025-7211: SQL Injection in code-projects LifeStyle Store

Medium
VulnerabilityCVE-2025-7211cvecve-2025-7211
Published: Wed Jul 09 2025 (07/09/2025, 02:02:04 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: LifeStyle Store

Description

A vulnerability was found in code-projects LifeStyle Store 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /cart_add.php. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/09/2025, 02:54:48 UTC

Technical Analysis

CVE-2025-7211 is a SQL Injection vulnerability identified in version 1.0 of the code-projects LifeStyle Store application, specifically within the /cart_add.php file. The vulnerability arises from improper sanitization or validation of the 'ID' parameter, which is used in SQL queries. An attacker can remotely manipulate this parameter to inject malicious SQL code, potentially allowing unauthorized access to or modification of the backend database. This can lead to data leakage, data corruption, or unauthorized administrative actions. The vulnerability requires no authentication or user interaction, making it exploitable by any remote attacker with network access to the affected application. Although the CVSS 4.0 score is 6.9 (medium severity), the impact on confidentiality, integrity, and availability is low to limited, as indicated by the vector metrics (VC:L, VI:L, VA:L). No known exploits are currently reported in the wild, but the exploit details have been publicly disclosed, increasing the risk of exploitation. No official patches or mitigation links have been provided yet, and the affected version is limited to LifeStyle Store 1.0, which may be a niche or smaller-scale e-commerce platform.

Potential Impact

For European organizations using the LifeStyle Store 1.0 platform, this vulnerability poses a risk of unauthorized data access or manipulation, potentially exposing customer data or disrupting e-commerce operations. The SQL injection could allow attackers to extract sensitive information such as user credentials, payment details, or order histories, leading to privacy violations and regulatory non-compliance under GDPR. Additionally, data integrity issues could undermine trust in the platform and cause financial losses. Given the remote and unauthenticated nature of the exploit, attackers could automate attacks at scale, affecting multiple organizations. However, the limited market penetration of this specific product in Europe and the absence of known active exploits reduce the immediate widespread impact. Still, organizations relying on this software should consider the risk significant enough to warrant prompt mitigation to avoid reputational damage and potential regulatory penalties.

Mitigation Recommendations

Organizations should immediately audit their use of the LifeStyle Store application to determine if version 1.0 is deployed. If so, they should implement input validation and parameterized queries or prepared statements to sanitize the 'ID' parameter in /cart_add.php, effectively preventing SQL injection. Until an official patch is released, deploying a Web Application Firewall (WAF) with custom rules to detect and block SQL injection patterns targeting the 'ID' parameter can provide interim protection. Regularly monitoring application logs for suspicious query patterns or repeated failed attempts to manipulate the 'ID' parameter is recommended. Additionally, organizations should consider isolating the application database with strict access controls and encrypt sensitive data at rest to minimize damage if exploitation occurs. Finally, maintaining an incident response plan that includes SQL injection attack scenarios will improve readiness.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-07T13:07:44.884Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 686dd6626f40f0eb72fdaed2

Added to database: 7/9/2025, 2:39:30 AM

Last enriched: 7/9/2025, 2:54:48 AM

Last updated: 7/9/2025, 4:05:02 AM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats