CVE-2025-7478: SQL Injection in code-projects Modern Bag
A vulnerability, which was classified as critical, was found in code-projects Modern Bag 1.0. Affected is an unknown function of the file /admin/category-list.php. The manipulation of the argument idCate leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-7478 is a critical SQL Injection vulnerability identified in version 1.0 of the code-projects Modern Bag application. The flaw exists in an unspecified function within the /admin/category-list.php file, where the idCate parameter is improperly sanitized, allowing an attacker to inject malicious SQL code. This vulnerability can be exploited remotely without requiring any authentication or user interaction, making it highly accessible to attackers. The injection can lead to unauthorized access, data leakage, data manipulation, or even complete compromise of the backend database. The CVSS 4.0 score is 6.9, indicating a medium severity level, primarily due to limited impact on confidentiality, integrity, and availability (each rated low), but with a low attack complexity and no privileges or user interaction required. Although no known exploits are currently observed in the wild, the public disclosure of the exploit increases the risk of exploitation. The vulnerability affects only version 1.0 of Modern Bag, a product by code-projects, and no official patches have been released yet. The lack of CWE classification and detailed technical specifics limits deeper analysis, but the nature of SQL injection vulnerabilities is well understood and typically allows attackers to execute arbitrary SQL commands against the database backend, potentially leading to data breaches or system compromise.
Potential Impact
For European organizations using Modern Bag 1.0, this vulnerability poses a significant risk to the confidentiality and integrity of their data. Attackers exploiting this flaw could extract sensitive information such as customer data, internal records, or credentials stored in the database. Additionally, attackers might alter or delete data, disrupting business operations and damaging trust. Given that the vulnerability is remotely exploitable without authentication, attackers can target exposed administrative interfaces directly, increasing the risk of automated or mass exploitation campaigns. The impact is particularly critical for organizations handling personal data under GDPR, as breaches could lead to regulatory penalties and reputational damage. Furthermore, if Modern Bag is integrated into e-commerce or inventory management systems, exploitation could disrupt supply chains or financial transactions. The medium CVSS score suggests that while the vulnerability is serious, the overall impact might be somewhat contained by the limited scope of the affected function or the database privileges associated with the vulnerable query. However, the absence of patches and public exploit availability necessitates urgent attention.
Mitigation Recommendations
European organizations should immediately audit their use of Modern Bag 1.0 and identify any exposed /admin/category-list.php endpoints. Until an official patch is released, organizations should implement the following mitigations: 1) Apply Web Application Firewall (WAF) rules specifically targeting SQL injection patterns on the idCate parameter to block malicious payloads. 2) Restrict access to the /admin directory via network controls such as IP whitelisting or VPN-only access to reduce exposure. 3) Conduct thorough input validation and parameterized query implementation in the affected code if source code access is available, replacing vulnerable dynamic SQL with prepared statements. 4) Monitor logs for suspicious query patterns or repeated access attempts to the vulnerable endpoint. 5) If feasible, upgrade or replace Modern Bag with a version or alternative product that is not vulnerable. 6) Prepare incident response plans to quickly contain and remediate any exploitation attempts. These targeted actions go beyond generic advice by focusing on immediate risk reduction and compensating controls while awaiting a vendor patch.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-7478: SQL Injection in code-projects Modern Bag
Description
A vulnerability, which was classified as critical, was found in code-projects Modern Bag 1.0. Affected is an unknown function of the file /admin/category-list.php. The manipulation of the argument idCate leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-7478 is a critical SQL Injection vulnerability identified in version 1.0 of the code-projects Modern Bag application. The flaw exists in an unspecified function within the /admin/category-list.php file, where the idCate parameter is improperly sanitized, allowing an attacker to inject malicious SQL code. This vulnerability can be exploited remotely without requiring any authentication or user interaction, making it highly accessible to attackers. The injection can lead to unauthorized access, data leakage, data manipulation, or even complete compromise of the backend database. The CVSS 4.0 score is 6.9, indicating a medium severity level, primarily due to limited impact on confidentiality, integrity, and availability (each rated low), but with a low attack complexity and no privileges or user interaction required. Although no known exploits are currently observed in the wild, the public disclosure of the exploit increases the risk of exploitation. The vulnerability affects only version 1.0 of Modern Bag, a product by code-projects, and no official patches have been released yet. The lack of CWE classification and detailed technical specifics limits deeper analysis, but the nature of SQL injection vulnerabilities is well understood and typically allows attackers to execute arbitrary SQL commands against the database backend, potentially leading to data breaches or system compromise.
Potential Impact
For European organizations using Modern Bag 1.0, this vulnerability poses a significant risk to the confidentiality and integrity of their data. Attackers exploiting this flaw could extract sensitive information such as customer data, internal records, or credentials stored in the database. Additionally, attackers might alter or delete data, disrupting business operations and damaging trust. Given that the vulnerability is remotely exploitable without authentication, attackers can target exposed administrative interfaces directly, increasing the risk of automated or mass exploitation campaigns. The impact is particularly critical for organizations handling personal data under GDPR, as breaches could lead to regulatory penalties and reputational damage. Furthermore, if Modern Bag is integrated into e-commerce or inventory management systems, exploitation could disrupt supply chains or financial transactions. The medium CVSS score suggests that while the vulnerability is serious, the overall impact might be somewhat contained by the limited scope of the affected function or the database privileges associated with the vulnerable query. However, the absence of patches and public exploit availability necessitates urgent attention.
Mitigation Recommendations
European organizations should immediately audit their use of Modern Bag 1.0 and identify any exposed /admin/category-list.php endpoints. Until an official patch is released, organizations should implement the following mitigations: 1) Apply Web Application Firewall (WAF) rules specifically targeting SQL injection patterns on the idCate parameter to block malicious payloads. 2) Restrict access to the /admin directory via network controls such as IP whitelisting or VPN-only access to reduce exposure. 3) Conduct thorough input validation and parameterized query implementation in the affected code if source code access is available, replacing vulnerable dynamic SQL with prepared statements. 4) Monitor logs for suspicious query patterns or repeated access attempts to the vulnerable endpoint. 5) If feasible, upgrade or replace Modern Bag with a version or alternative product that is not vulnerable. 6) Prepare incident response plans to quickly contain and remediate any exploitation attempts. These targeted actions go beyond generic advice by focusing on immediate risk reduction and compensating controls while awaiting a vendor patch.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-07-11T12:43:32.953Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68727c37a83201eaacb4f9a0
Added to database: 7/12/2025, 3:16:07 PM
Last enriched: 7/12/2025, 3:31:10 PM
Last updated: 7/12/2025, 3:31:10 PM
Views: 2
Related Threats
CVE-2025-7482: SQL Injection in PHPGurukul Vehicle Parking Management System
MediumCVE-2025-7481: SQL Injection in PHPGurukul Vehicle Parking Management System
MediumCVE-2025-7480: SQL Injection in PHPGurukul Vehicle Parking Management System
MediumCVE-2025-7479: SQL Injection in PHPGurukul Vehicle Parking Management System
MediumCVE-2025-7477: Unrestricted Upload in code-projects Simple Car Rental System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.