Skip to main content

CVE-2025-7455: SQL Injection in Campcodes Online Movie Theater Seat Reservation System

Medium
VulnerabilityCVE-2025-7455cvecve-2025-7455
Published: Fri Jul 11 2025 (07/11/2025, 19:32:05 UTC)
Source: CVE Database V5
Vendor/Project: Campcodes
Product: Online Movie Theater Seat Reservation System

Description

A vulnerability classified as critical was found in Campcodes Online Movie Theater Seat Reservation System 1.0. Affected by this vulnerability is an unknown functionality of the file /manage_reserve.php. The manipulation of the argument mid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/11/2025, 20:01:07 UTC

Technical Analysis

CVE-2025-7455 is a SQL Injection vulnerability identified in version 1.0 of the Campcodes Online Movie Theater Seat Reservation System. The vulnerability resides in the /manage_reserve.php file, specifically in the handling of the 'mid' parameter. An attacker can remotely manipulate this parameter to inject malicious SQL code, potentially allowing unauthorized access to the backend database. This could lead to unauthorized data disclosure, data modification, or even deletion, depending on the database privileges. The vulnerability requires no authentication or user interaction, making it exploitable by any remote attacker with network access to the affected system. The CVSS 4.0 base score is 6.9, categorized as medium severity, reflecting the network attack vector, low attack complexity, and no privileges or user interaction required. The impact on confidentiality, integrity, and availability is rated low individually, but combined they can lead to significant compromise of the reservation system's data integrity and confidentiality. No patches or mitigations have been publicly disclosed yet, and while no known exploits are currently in the wild, the public disclosure of the exploit code increases the risk of exploitation.

Potential Impact

For European organizations operating or using the Campcodes Online Movie Theater Seat Reservation System, this vulnerability poses a tangible risk to customer data privacy and operational continuity. Exploitation could lead to unauthorized access to sensitive customer information such as reservation details, personal identifiers, and payment-related data if stored in the database. Additionally, attackers could manipulate reservation data, causing operational disruptions, double bookings, or denial of service to legitimate customers. This could damage customer trust and lead to regulatory non-compliance, especially under GDPR, which mandates strict data protection and breach notification requirements. The potential for data integrity compromise may also affect business analytics and reporting. Given the remote exploitability and lack of required authentication, attackers could target these systems en masse, increasing the risk of widespread impact across multiple theaters or chains in Europe.

Mitigation Recommendations

Immediate mitigation should focus on input validation and parameterized queries to prevent SQL injection. Specifically, developers should sanitize and validate the 'mid' parameter in /manage_reserve.php, employing prepared statements or stored procedures to handle database queries securely. Until a vendor patch is available, organizations should implement Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'mid' parameter. Network segmentation should be applied to limit external access to the reservation system backend. Regular monitoring of logs for suspicious query patterns or repeated failed requests to /manage_reserve.php is recommended. Organizations should also conduct code reviews and penetration testing focused on SQL injection vectors. Finally, maintaining up-to-date backups of reservation data will help recovery in case of data corruption or deletion due to exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-11T08:57:46.022Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 687169fca83201eaacb040dc

Added to database: 7/11/2025, 7:46:04 PM

Last enriched: 7/11/2025, 8:01:07 PM

Last updated: 7/11/2025, 8:01:07 PM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats