Skip to main content

CVE-2025-7471: SQL Injection in code-projects Modern Bag

Medium
VulnerabilityCVE-2025-7471cvecve-2025-7471
Published: Sat Jul 12 2025 (07/12/2025, 11:32:05 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Modern Bag

Description

A vulnerability was found in code-projects Modern Bag 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/login-back.php. The manipulation of the argument user-name leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/12/2025, 12:01:08 UTC

Technical Analysis

CVE-2025-7471 is a SQL Injection vulnerability identified in version 1.0 of the code-projects Modern Bag application, specifically within the /admin/login-back.php file. The vulnerability arises from improper sanitization or validation of the 'user-name' parameter, which allows an attacker to inject malicious SQL code remotely without requiring any authentication or user interaction. This flaw enables an attacker to manipulate backend database queries, potentially leading to unauthorized data access, data modification, or even complete compromise of the database. The vulnerability has been publicly disclosed but no known exploits are currently reported in the wild. The CVSS 4.0 base score is 6.9, categorized as medium severity, reflecting the ease of remote exploitation without privileges but limited impact on confidentiality, integrity, and availability (each rated low). The vulnerability does not require user interaction and can be exploited over the network, making it a significant risk for exposed installations of this software. However, the scope is limited to the affected version 1.0 of Modern Bag, and no patches or mitigations have been officially published yet.

Potential Impact

For European organizations using code-projects Modern Bag 1.0, this vulnerability poses a risk of unauthorized database access through SQL Injection attacks. Potential impacts include leakage of sensitive information, unauthorized modification or deletion of data, and disruption of application functionality. Since the vulnerability affects the admin login backend, successful exploitation could allow attackers to bypass authentication or escalate privileges, leading to broader system compromise. This could impact confidentiality and integrity of organizational data, especially if the application manages critical business or customer information. The remote and unauthenticated nature of the exploit increases the risk of automated attacks targeting exposed instances. European organizations in sectors such as retail, logistics, or manufacturing using this software could face operational disruptions, reputational damage, and regulatory compliance issues under GDPR if personal data is compromised.

Mitigation Recommendations

Organizations should immediately audit their use of code-projects Modern Bag and identify any instances running version 1.0. Until an official patch is released, implement web application firewall (WAF) rules to detect and block SQL Injection attempts targeting the 'user-name' parameter in /admin/login-back.php. Employ input validation and parameterized queries if source code access is available to developers. Restrict access to the admin login page by IP whitelisting or VPN to reduce exposure. Monitor logs for suspicious activity related to login attempts and SQL errors. Engage with the vendor or community to obtain or develop patches addressing the vulnerability. Additionally, conduct regular security assessments and penetration testing to identify similar injection flaws. Prepare incident response plans to quickly contain any potential exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-11T12:02:04.246Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68724affa83201eaacb43c1a

Added to database: 7/12/2025, 11:46:07 AM

Last enriched: 7/12/2025, 12:01:08 PM

Last updated: 7/12/2025, 1:54:17 PM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats