Skip to main content

CVE-2025-7512: SQL Injection in code-projects Modern Bag

Medium
VulnerabilityCVE-2025-7512cvecve-2025-7512
Published: Sun Jul 13 2025 (07/13/2025, 02:02:06 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Modern Bag

Description

A vulnerability was found in code-projects Modern Bag 1.0. It has been classified as critical. Affected is an unknown function of the file /contact-back.php. The manipulation of the argument contact-name leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/20/2025, 21:02:08 UTC

Technical Analysis

CVE-2025-7512 is a SQL Injection vulnerability identified in version 1.0 of the code-projects Modern Bag application. The vulnerability exists in an unspecified function within the /contact-back.php file, where the 'contact-name' parameter is improperly sanitized or validated, allowing an attacker to inject malicious SQL code. This injection flaw enables remote exploitation without requiring any authentication or user interaction, as the attack vector is through a network-accessible parameter. The vulnerability could allow an attacker to manipulate backend database queries, potentially leading to unauthorized data access, data modification, or even deletion. The CVSS 4.0 base score is 6.9, categorized as medium severity, reflecting the ease of exploitation (network vector, no privileges required) but limited impact on confidentiality, integrity, and availability (all rated low). No known exploits have been reported in the wild yet, and no patches have been published at the time of disclosure. The vulnerability's presence in a contact form backend script suggests it could be part of a web application used for customer interaction or support, making it a critical point of entry if exploited. Given the public disclosure of the exploit details, there is a risk of opportunistic attacks targeting unpatched systems.

Potential Impact

For European organizations using code-projects Modern Bag 1.0, this vulnerability poses a risk of unauthorized access to sensitive customer or organizational data stored in backend databases. Exploitation could lead to data breaches, loss of data integrity, and potential disruption of customer communication channels. Organizations in sectors with strict data protection regulations, such as GDPR, could face compliance violations and reputational damage if personal data is exposed. The remote and unauthenticated nature of the vulnerability increases the likelihood of exploitation, especially in environments where the application is internet-facing. Additionally, attackers could leverage this vulnerability as a foothold for further lateral movement within the network. The medium severity rating suggests that while the impact is not catastrophic, the risk is significant enough to warrant prompt remediation to prevent data compromise and service disruption.

Mitigation Recommendations

Organizations should immediately audit their use of code-projects Modern Bag version 1.0 and prioritize upgrading to a patched version once available. In the absence of an official patch, temporary mitigations include implementing web application firewall (WAF) rules to detect and block SQL injection patterns targeting the 'contact-name' parameter in /contact-back.php. Input validation and parameterized queries should be enforced at the application level to sanitize user inputs rigorously. Network segmentation and restricting access to the application backend can reduce exposure. Regular monitoring of logs for suspicious query patterns and anomalous database activity is recommended. Additionally, organizations should conduct penetration testing focused on injection flaws to identify similar vulnerabilities. Finally, maintaining an incident response plan to quickly address any exploitation attempts is critical.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-11T20:48:59.910Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68731deda83201eaacb71c53

Added to database: 7/13/2025, 2:46:05 AM

Last enriched: 7/20/2025, 9:02:08 PM

Last updated: 8/23/2025, 11:39:29 PM

Views: 37

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats