Skip to main content

CVE-2025-7510: SQL Injection in code-projects Modern Bag

Medium
VulnerabilityCVE-2025-7510cvecve-2025-7510
Published: Sun Jul 13 2025 (07/13/2025, 00:32:05 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Modern Bag

Description

A vulnerability has been found in code-projects Modern Bag 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/productadd_back.php. The manipulation of the argument namepro leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/20/2025, 21:01:48 UTC

Technical Analysis

CVE-2025-7510 is a critical SQL Injection vulnerability identified in version 1.0 of the code-projects Modern Bag application. The vulnerability exists in the /admin/productadd_back.php file, specifically in the handling of the 'namepro' parameter. An attacker can remotely manipulate this parameter to inject malicious SQL code, potentially allowing unauthorized access to the backend database. The vulnerability requires no authentication or user interaction, making it exploitable over the network by any unauthenticated attacker. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the ease of exploitation (network vector, no privileges required) but limited impact on confidentiality, integrity, and availability (all rated low). Although no public exploits are currently known in the wild, the exploit details have been publicly disclosed, increasing the risk of exploitation. The vulnerability could allow attackers to extract sensitive data, modify or delete database records, or disrupt application functionality, depending on the database privileges of the application. The lack of a patch link indicates that a fix may not yet be available, emphasizing the need for immediate mitigation steps. This vulnerability is typical of improper input validation and insufficient use of parameterized queries or prepared statements in the affected PHP script.

Potential Impact

For European organizations using the Modern Bag 1.0 application, this vulnerability poses a significant risk to the confidentiality and integrity of their data. Exploitation could lead to unauthorized disclosure of sensitive product or customer information stored in the backend database. Additionally, attackers could alter or delete critical data, impacting business operations and trust. Since the vulnerability is remotely exploitable without authentication, attackers can target exposed administrative endpoints directly. This is particularly concerning for e-commerce or inventory management systems where product data integrity is crucial. The medium CVSS score suggests a moderate impact, but the critical classification and public disclosure elevate the urgency. Organizations may face regulatory compliance issues under GDPR if personal data is compromised. The absence of known exploits in the wild currently limits immediate widespread impact, but the public disclosure could lead to rapid weaponization. European companies relying on this software should prioritize assessment and remediation to avoid potential data breaches and operational disruptions.

Mitigation Recommendations

1. Immediate mitigation should include restricting access to the /admin/productadd_back.php endpoint using network-level controls such as IP whitelisting, VPN access, or web application firewalls (WAF) with rules to detect and block SQL injection patterns. 2. Review and sanitize all input parameters, especially 'namepro', implementing strict input validation and employing parameterized queries or prepared statements to prevent SQL injection. 3. If possible, disable or restrict administrative functionalities exposed on the internet until a patch is available. 4. Monitor application logs for suspicious activities indicative of SQL injection attempts, such as unusual query patterns or error messages. 5. Engage with the vendor or community to obtain or develop patches addressing this vulnerability. 6. Conduct a thorough security audit of the entire application to identify and remediate similar injection flaws. 7. Educate developers on secure coding practices to prevent future injection vulnerabilities. 8. Implement database-level protections such as least privilege access for the application user to limit the impact of any successful injection.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-11T20:43:10.073Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 687301cda83201eaacb6c03a

Added to database: 7/13/2025, 12:46:05 AM

Last enriched: 7/20/2025, 9:01:48 PM

Last updated: 8/22/2025, 5:01:58 AM

Views: 34

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats