CVE-2025-7457: SQL Injection in Campcodes Online Movie Theater Seat Reservation System
A vulnerability, which was classified as critical, was found in Campcodes Online Movie Theater Seat Reservation System 1.0. This affects an unknown part of the file /admin/manage_movie.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-7457 is a SQL Injection vulnerability identified in version 1.0 of the Campcodes Online Movie Theater Seat Reservation System. The vulnerability exists in the /admin/manage_movie.php file, specifically through improper sanitization or validation of the 'ID' parameter. An attacker can remotely exploit this flaw without any authentication or user interaction, by manipulating the 'ID' argument to inject malicious SQL code. This can lead to unauthorized access or modification of the backend database, potentially exposing sensitive data or allowing further compromise of the system. The CVSS 4.0 base score is 6.9, indicating a medium severity level, with the vector showing network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and partial impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although no known exploits are currently reported in the wild, the public disclosure of the exploit code increases the risk of exploitation. The vulnerability affects only version 1.0 of the product, and no official patches or mitigations have been published yet.
Potential Impact
For European organizations using the Campcodes Online Movie Theater Seat Reservation System, this vulnerability poses a significant risk. Exploitation could lead to unauthorized data access, including customer personal information and reservation details, potentially violating GDPR and other data protection regulations. The integrity of reservation data could be compromised, leading to operational disruptions such as double bookings or denial of service to legitimate customers. Availability impacts could affect business continuity, damaging reputation and customer trust. Given the remote and unauthenticated nature of the exploit, attackers could easily target vulnerable systems, increasing the likelihood of attacks. Organizations in the entertainment and event management sectors, especially those relying on this system for ticketing and seat management, are at heightened risk.
Mitigation Recommendations
Immediate mitigation steps include implementing input validation and parameterized queries or prepared statements to prevent SQL injection in the 'ID' parameter within /admin/manage_movie.php. Organizations should conduct a thorough code review of the affected module to identify and remediate similar injection points. Network-level protections such as Web Application Firewalls (WAFs) should be configured to detect and block SQL injection patterns targeting this endpoint. Restricting access to the admin interface by IP whitelisting or VPN can reduce exposure. Monitoring database logs and application logs for suspicious queries or anomalies is advised to detect potential exploitation attempts. Since no official patch is available, organizations should engage with the vendor for updates or consider temporary migration to alternative systems. Regular backups and incident response plans should be updated to prepare for potential data compromise scenarios.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden
CVE-2025-7457: SQL Injection in Campcodes Online Movie Theater Seat Reservation System
Description
A vulnerability, which was classified as critical, was found in Campcodes Online Movie Theater Seat Reservation System 1.0. This affects an unknown part of the file /admin/manage_movie.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-7457 is a SQL Injection vulnerability identified in version 1.0 of the Campcodes Online Movie Theater Seat Reservation System. The vulnerability exists in the /admin/manage_movie.php file, specifically through improper sanitization or validation of the 'ID' parameter. An attacker can remotely exploit this flaw without any authentication or user interaction, by manipulating the 'ID' argument to inject malicious SQL code. This can lead to unauthorized access or modification of the backend database, potentially exposing sensitive data or allowing further compromise of the system. The CVSS 4.0 base score is 6.9, indicating a medium severity level, with the vector showing network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and partial impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although no known exploits are currently reported in the wild, the public disclosure of the exploit code increases the risk of exploitation. The vulnerability affects only version 1.0 of the product, and no official patches or mitigations have been published yet.
Potential Impact
For European organizations using the Campcodes Online Movie Theater Seat Reservation System, this vulnerability poses a significant risk. Exploitation could lead to unauthorized data access, including customer personal information and reservation details, potentially violating GDPR and other data protection regulations. The integrity of reservation data could be compromised, leading to operational disruptions such as double bookings or denial of service to legitimate customers. Availability impacts could affect business continuity, damaging reputation and customer trust. Given the remote and unauthenticated nature of the exploit, attackers could easily target vulnerable systems, increasing the likelihood of attacks. Organizations in the entertainment and event management sectors, especially those relying on this system for ticketing and seat management, are at heightened risk.
Mitigation Recommendations
Immediate mitigation steps include implementing input validation and parameterized queries or prepared statements to prevent SQL injection in the 'ID' parameter within /admin/manage_movie.php. Organizations should conduct a thorough code review of the affected module to identify and remediate similar injection points. Network-level protections such as Web Application Firewalls (WAFs) should be configured to detect and block SQL injection patterns targeting this endpoint. Restricting access to the admin interface by IP whitelisting or VPN can reduce exposure. Monitoring database logs and application logs for suspicious queries or anomalies is advised to detect potential exploitation attempts. Since no official patch is available, organizations should engage with the vendor for updates or consider temporary migration to alternative systems. Regular backups and incident response plans should be updated to prepare for potential data compromise scenarios.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-07-11T08:57:51.110Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6871780ca83201eaacb147fe
Added to database: 7/11/2025, 8:46:04 PM
Last enriched: 7/18/2025, 9:22:13 PM
Last updated: 11/23/2025, 7:41:46 PM
Views: 83
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13565: Weak Password Recovery in SourceCodester Inventory Management System
MediumCVE-2025-13564: Denial of Service in SourceCodester Pre-School Management System
MediumCVE-2025-13562: Command Injection in D-Link DIR-852
MediumCVE-2025-13561: SQL Injection in SourceCodester Company Website CMS
MediumCVE-2025-54515: CWE-1284 Improper Validation of Specified Quantity in Input in AMD Versal™ Adaptive SoC Devices
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.