Skip to main content

CVE-2025-7510: SQL Injection in code-projects Modern Bag

Medium
VulnerabilityCVE-2025-7510cvecve-2025-7510
Published: Sun Jul 13 2025 (07/13/2025, 00:32:05 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Modern Bag

Description

A vulnerability has been found in code-projects Modern Bag 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/productadd_back.php. The manipulation of the argument namepro leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/13/2025, 01:01:07 UTC

Technical Analysis

CVE-2025-7510 is a critical SQL Injection vulnerability identified in version 1.0 of the code-projects Modern Bag application. The vulnerability resides in the /admin/productadd_back.php file, specifically in the handling of the 'namepro' parameter. An attacker can remotely exploit this flaw by manipulating the 'namepro' argument to inject malicious SQL code. This injection can lead to unauthorized access or modification of the backend database, potentially exposing sensitive data or allowing further compromise of the system. The vulnerability requires no authentication or user interaction, making it highly accessible for remote attackers. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the network attack vector, low complexity, and no privileges or user interaction needed. The impact on confidentiality, integrity, and availability is rated as low individually, but combined they can lead to significant data exposure or corruption. No patches or fixes have been publicly disclosed yet, and no known exploits are currently active in the wild, although public disclosure of the exploit code increases the risk of imminent attacks. The vulnerability affects only version 1.0 of Modern Bag, which is a niche product likely used in e-commerce or inventory management contexts. Given the nature of SQL injection, attackers could extract database contents, modify or delete records, or escalate privileges within the application environment.

Potential Impact

For European organizations using Modern Bag 1.0, this vulnerability poses a significant risk of data breach and operational disruption. Exploitation could lead to unauthorized disclosure of customer data, product information, or internal business records, violating GDPR and other data protection regulations. The ability to remotely exploit without authentication increases the likelihood of automated attacks or mass scanning campaigns targeting vulnerable installations. This could damage organizational reputation, incur regulatory fines, and cause financial losses. Additionally, if the compromised database contains payment or personally identifiable information, the impact escalates to severe legal and compliance consequences. Organizations relying on this software for critical business functions may experience downtime or data integrity issues, affecting supply chain or sales operations. The medium CVSS score suggests moderate but tangible risk, especially if combined with other vulnerabilities or weak network defenses.

Mitigation Recommendations

1. Immediate mitigation should focus on restricting access to the /admin/productadd_back.php endpoint through network-level controls such as IP whitelisting, VPN access, or web application firewalls (WAF) with SQL injection detection and blocking capabilities. 2. Implement input validation and parameterized queries or prepared statements in the application code to sanitize the 'namepro' parameter and prevent SQL injection. 3. Monitor logs for suspicious activity targeting the 'namepro' parameter or unusual database queries. 4. Conduct a thorough audit of all input handling in the application to identify and remediate similar injection points. 5. If possible, isolate the affected application environment to limit lateral movement in case of compromise. 6. Engage with the vendor or developer community to obtain or develop patches and update to a fixed version once available. 7. Educate administrators and developers about secure coding practices and the risks of SQL injection. 8. Regularly back up databases and verify backup integrity to enable recovery from potential data corruption or deletion.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-11T20:43:10.073Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 687301cda83201eaacb6c03a

Added to database: 7/13/2025, 12:46:05 AM

Last enriched: 7/13/2025, 1:01:07 AM

Last updated: 7/13/2025, 1:01:07 AM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats