Skip to main content

CVE-2025-7512: SQL Injection in code-projects Modern Bag

Medium
VulnerabilityCVE-2025-7512cvecve-2025-7512
Published: Sun Jul 13 2025 (07/13/2025, 02:02:06 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Modern Bag

Description

A vulnerability was found in code-projects Modern Bag 1.0. It has been classified as critical. Affected is an unknown function of the file /contact-back.php. The manipulation of the argument contact-name leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/13/2025, 03:01:22 UTC

Technical Analysis

CVE-2025-7512 is a SQL Injection vulnerability identified in version 1.0 of the 'Modern Bag' product developed by code-projects. The vulnerability resides in the /contact-back.php file, specifically in the handling of the 'contact-name' parameter. An attacker can remotely manipulate this parameter to inject malicious SQL code, potentially altering the intended database queries executed by the application. This can lead to unauthorized data access, data modification, or even complete compromise of the backend database. The vulnerability requires no authentication or user interaction, making it accessible to any remote attacker. The CVSS 4.0 base score is 6.9, indicating a medium severity level. The vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and partial impacts on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although the exploit has been publicly disclosed, there are no known exploits currently observed in the wild. No patches or fixes have been linked yet, which increases the risk for unpatched systems. The vulnerability’s impact is primarily on the confidentiality and integrity of the database managed by the Modern Bag application, with potential availability impacts if the database is disrupted. The lack of authentication and user interaction requirements makes this vulnerability particularly dangerous for exposed web servers running this software version.

Potential Impact

For European organizations using the Modern Bag 1.0 product, this vulnerability poses a significant risk to the confidentiality and integrity of their data. Attackers exploiting this SQL injection could extract sensitive customer information, modify stored data, or disrupt business operations by corrupting the database. Given the remote exploitability without authentication, any exposed web server running this vulnerable version is at risk. This could lead to data breaches subject to GDPR regulations, resulting in legal and financial penalties. Additionally, compromised data integrity could undermine trust and operational reliability. The medium severity rating suggests that while the vulnerability is serious, the impact might be limited by the scope of the affected application and database privileges. However, if the database contains critical or personal data, the consequences could be severe. European organizations with e-commerce or customer contact systems using this product should prioritize assessment and remediation to avoid regulatory and reputational damage.

Mitigation Recommendations

1. Immediate mitigation should include restricting external access to the /contact-back.php endpoint via web application firewalls (WAFs) or network-level controls to limit exposure. 2. Implement input validation and parameterized queries or prepared statements in the application code to prevent SQL injection attacks. 3. Monitor web server and database logs for unusual query patterns or error messages indicative of injection attempts. 4. If possible, upgrade or patch the Modern Bag product once an official fix is released by the vendor. 5. Conduct a thorough security audit of the application and database to identify and remediate any other injection points. 6. Employ runtime application self-protection (RASP) tools to detect and block injection attacks in real time. 7. Educate developers on secure coding practices to prevent similar vulnerabilities in future releases. 8. As a temporary measure, disable or limit the functionality of the vulnerable contact form if it is not critical to business operations.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-11T20:48:59.910Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68731deda83201eaacb71c53

Added to database: 7/13/2025, 2:46:05 AM

Last enriched: 7/13/2025, 3:01:22 AM

Last updated: 7/13/2025, 3:01:22 AM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats