Skip to main content

CVE-2025-7459: SQL Injection in code-projects Mobile Shop

Medium
VulnerabilityCVE-2025-7459cvecve-2025-7459
Published: Fri Jul 11 2025 (07/11/2025, 21:02:05 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Mobile Shop

Description

A vulnerability classified as critical was found in code-projects Mobile Shop 1.0. This vulnerability affects unknown code of the file /EditMobile.php. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/11/2025, 21:31:07 UTC

Technical Analysis

CVE-2025-7459 is a critical SQL Injection vulnerability identified in version 1.0 of the code-projects Mobile Shop application. The vulnerability exists in the /EditMobile.php file, where the 'ID' parameter is improperly sanitized, allowing an attacker to manipulate the SQL query executed by the backend database. This flaw enables remote attackers to inject arbitrary SQL commands without any authentication or user interaction, potentially leading to unauthorized data access, data modification, or even complete compromise of the underlying database. The vulnerability is exploitable over the network, increasing its risk profile. Although the exact database type and query structure are unspecified, the injection vector through the 'ID' parameter suggests that the application fails to use parameterized queries or adequate input validation. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the absence of authentication and user interaction requirements but limited impact on confidentiality, integrity, and availability (all rated low). No known exploits are currently reported in the wild, and no patches have been published yet. However, public disclosure of the exploit details increases the likelihood of exploitation attempts.

Potential Impact

For European organizations using code-projects Mobile Shop 1.0, this vulnerability poses a significant risk to the confidentiality and integrity of their data. Attackers exploiting this flaw could extract sensitive customer information, manipulate product or pricing data, or disrupt business operations by corrupting the database. This could lead to financial losses, reputational damage, and regulatory non-compliance, especially under GDPR requirements for protecting personal data. Retailers and e-commerce businesses relying on this software may face operational disruptions and potential legal consequences if customer data is compromised. The remote and unauthenticated nature of the attack vector increases the threat surface, making it easier for cybercriminals to target vulnerable installations across Europe without needing insider access or user interaction.

Mitigation Recommendations

Immediate mitigation steps include implementing strict input validation and sanitization for the 'ID' parameter in /EditMobile.php, preferably by adopting parameterized queries or prepared statements to prevent SQL injection. Organizations should conduct a thorough code review of the Mobile Shop application to identify and remediate similar injection points. Until an official patch is released, deploying a Web Application Firewall (WAF) with custom rules to detect and block SQL injection patterns targeting the 'ID' parameter can reduce exposure. Monitoring application logs for suspicious query patterns and unusual database activity is also recommended. Additionally, restricting database user privileges to the minimum necessary can limit the impact of a successful injection. Organizations should prioritize upgrading to a patched version once available and consider isolating the application environment to minimize lateral movement risks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-11T11:08:03.324Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68717f14a83201eaacb16504

Added to database: 7/11/2025, 9:16:04 PM

Last enriched: 7/11/2025, 9:31:07 PM

Last updated: 7/11/2025, 9:31:07 PM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats