CVE-2025-7471: SQL Injection in code-projects Modern Bag
A vulnerability was found in code-projects Modern Bag 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/login-back.php. The manipulation of the argument user-name leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-7471 is a SQL Injection vulnerability identified in version 1.0 of the code-projects Modern Bag application, specifically within the /admin/login-back.php file. The vulnerability arises from improper sanitization or validation of the 'user-name' parameter, which allows an attacker to inject malicious SQL code remotely without requiring any authentication or user interaction. This flaw enables an attacker to manipulate backend database queries, potentially leading to unauthorized data access, data modification, or even complete compromise of the database. The vulnerability has been publicly disclosed but no known exploits are currently reported in the wild. The CVSS 4.0 base score is 6.9, categorized as medium severity, reflecting the ease of remote exploitation without privileges but limited impact on confidentiality, integrity, and availability (each rated low). The vulnerability does not require user interaction and can be exploited over the network, making it a significant risk for exposed installations of this software. However, the scope is limited to the affected version 1.0 of Modern Bag, and no patches or mitigations have been officially published yet.
Potential Impact
For European organizations using code-projects Modern Bag 1.0, this vulnerability poses a risk of unauthorized database access through SQL Injection attacks. Potential impacts include leakage of sensitive information, unauthorized modification or deletion of data, and disruption of application functionality. Since the vulnerability affects the admin login backend, successful exploitation could allow attackers to bypass authentication or escalate privileges, leading to broader system compromise. This could impact confidentiality and integrity of organizational data, especially if the application manages critical business or customer information. The remote and unauthenticated nature of the exploit increases the risk of automated attacks targeting exposed instances. European organizations in sectors such as retail, logistics, or manufacturing using this software could face operational disruptions, reputational damage, and regulatory compliance issues under GDPR if personal data is compromised.
Mitigation Recommendations
Organizations should immediately audit their use of code-projects Modern Bag and identify any instances running version 1.0. Until an official patch is released, implement web application firewall (WAF) rules to detect and block SQL Injection attempts targeting the 'user-name' parameter in /admin/login-back.php. Employ input validation and parameterized queries if source code access is available to developers. Restrict access to the admin login page by IP whitelisting or VPN to reduce exposure. Monitor logs for suspicious activity related to login attempts and SQL errors. Engage with the vendor or community to obtain or develop patches addressing the vulnerability. Additionally, conduct regular security assessments and penetration testing to identify similar injection flaws. Prepare incident response plans to quickly contain any potential exploitation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-7471: SQL Injection in code-projects Modern Bag
Description
A vulnerability was found in code-projects Modern Bag 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/login-back.php. The manipulation of the argument user-name leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-7471 is a SQL Injection vulnerability identified in version 1.0 of the code-projects Modern Bag application, specifically within the /admin/login-back.php file. The vulnerability arises from improper sanitization or validation of the 'user-name' parameter, which allows an attacker to inject malicious SQL code remotely without requiring any authentication or user interaction. This flaw enables an attacker to manipulate backend database queries, potentially leading to unauthorized data access, data modification, or even complete compromise of the database. The vulnerability has been publicly disclosed but no known exploits are currently reported in the wild. The CVSS 4.0 base score is 6.9, categorized as medium severity, reflecting the ease of remote exploitation without privileges but limited impact on confidentiality, integrity, and availability (each rated low). The vulnerability does not require user interaction and can be exploited over the network, making it a significant risk for exposed installations of this software. However, the scope is limited to the affected version 1.0 of Modern Bag, and no patches or mitigations have been officially published yet.
Potential Impact
For European organizations using code-projects Modern Bag 1.0, this vulnerability poses a risk of unauthorized database access through SQL Injection attacks. Potential impacts include leakage of sensitive information, unauthorized modification or deletion of data, and disruption of application functionality. Since the vulnerability affects the admin login backend, successful exploitation could allow attackers to bypass authentication or escalate privileges, leading to broader system compromise. This could impact confidentiality and integrity of organizational data, especially if the application manages critical business or customer information. The remote and unauthenticated nature of the exploit increases the risk of automated attacks targeting exposed instances. European organizations in sectors such as retail, logistics, or manufacturing using this software could face operational disruptions, reputational damage, and regulatory compliance issues under GDPR if personal data is compromised.
Mitigation Recommendations
Organizations should immediately audit their use of code-projects Modern Bag and identify any instances running version 1.0. Until an official patch is released, implement web application firewall (WAF) rules to detect and block SQL Injection attempts targeting the 'user-name' parameter in /admin/login-back.php. Employ input validation and parameterized queries if source code access is available to developers. Restrict access to the admin login page by IP whitelisting or VPN to reduce exposure. Monitor logs for suspicious activity related to login attempts and SQL errors. Engage with the vendor or community to obtain or develop patches addressing the vulnerability. Additionally, conduct regular security assessments and penetration testing to identify similar injection flaws. Prepare incident response plans to quickly contain any potential exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-07-11T12:02:04.246Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68724affa83201eaacb43c1a
Added to database: 7/12/2025, 11:46:07 AM
Last enriched: 7/12/2025, 12:01:08 PM
Last updated: 7/12/2025, 1:54:17 PM
Views: 3
Related Threats
CVE-2025-7477: Unrestricted Upload in code-projects Simple Car Rental System
MediumCVE-2025-7476: SQL Injection in code-projects Simple Car Rental System
MediumCVE-2025-7475: SQL Injection in code-projects Simple Car Rental System
MediumCVE-2025-7474: SQL Injection in code-projects Job Diary
MediumCVE-2025-36104: CWE-277 Insecure Inherited Permissions in IBM Storage Scale
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.