CVE-2025-7512: SQL Injection in code-projects Modern Bag
A vulnerability was found in code-projects Modern Bag 1.0. It has been classified as critical. Affected is an unknown function of the file /contact-back.php. The manipulation of the argument contact-name leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-7512 is a SQL Injection vulnerability identified in version 1.0 of the code-projects Modern Bag application. The vulnerability exists in an unspecified function within the /contact-back.php file, where the 'contact-name' parameter is improperly sanitized or validated, allowing an attacker to inject malicious SQL code. This injection flaw enables remote exploitation without requiring any authentication or user interaction, as the attack vector is through a network-accessible parameter. The vulnerability could allow an attacker to manipulate backend database queries, potentially leading to unauthorized data access, data modification, or even deletion. The CVSS 4.0 base score is 6.9, categorized as medium severity, reflecting the ease of exploitation (network vector, no privileges required) but limited impact on confidentiality, integrity, and availability (all rated low). No known exploits have been reported in the wild yet, and no patches have been published at the time of disclosure. The vulnerability's presence in a contact form backend script suggests it could be part of a web application used for customer interaction or support, making it a critical point of entry if exploited. Given the public disclosure of the exploit details, there is a risk of opportunistic attacks targeting unpatched systems.
Potential Impact
For European organizations using code-projects Modern Bag 1.0, this vulnerability poses a risk of unauthorized access to sensitive customer or organizational data stored in backend databases. Exploitation could lead to data breaches, loss of data integrity, and potential disruption of customer communication channels. Organizations in sectors with strict data protection regulations, such as GDPR, could face compliance violations and reputational damage if personal data is exposed. The remote and unauthenticated nature of the vulnerability increases the likelihood of exploitation, especially in environments where the application is internet-facing. Additionally, attackers could leverage this vulnerability as a foothold for further lateral movement within the network. The medium severity rating suggests that while the impact is not catastrophic, the risk is significant enough to warrant prompt remediation to prevent data compromise and service disruption.
Mitigation Recommendations
Organizations should immediately audit their use of code-projects Modern Bag version 1.0 and prioritize upgrading to a patched version once available. In the absence of an official patch, temporary mitigations include implementing web application firewall (WAF) rules to detect and block SQL injection patterns targeting the 'contact-name' parameter in /contact-back.php. Input validation and parameterized queries should be enforced at the application level to sanitize user inputs rigorously. Network segmentation and restricting access to the application backend can reduce exposure. Regular monitoring of logs for suspicious query patterns and anomalous database activity is recommended. Additionally, organizations should conduct penetration testing focused on injection flaws to identify similar vulnerabilities. Finally, maintaining an incident response plan to quickly address any exploitation attempts is critical.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-7512: SQL Injection in code-projects Modern Bag
Description
A vulnerability was found in code-projects Modern Bag 1.0. It has been classified as critical. Affected is an unknown function of the file /contact-back.php. The manipulation of the argument contact-name leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-7512 is a SQL Injection vulnerability identified in version 1.0 of the code-projects Modern Bag application. The vulnerability exists in an unspecified function within the /contact-back.php file, where the 'contact-name' parameter is improperly sanitized or validated, allowing an attacker to inject malicious SQL code. This injection flaw enables remote exploitation without requiring any authentication or user interaction, as the attack vector is through a network-accessible parameter. The vulnerability could allow an attacker to manipulate backend database queries, potentially leading to unauthorized data access, data modification, or even deletion. The CVSS 4.0 base score is 6.9, categorized as medium severity, reflecting the ease of exploitation (network vector, no privileges required) but limited impact on confidentiality, integrity, and availability (all rated low). No known exploits have been reported in the wild yet, and no patches have been published at the time of disclosure. The vulnerability's presence in a contact form backend script suggests it could be part of a web application used for customer interaction or support, making it a critical point of entry if exploited. Given the public disclosure of the exploit details, there is a risk of opportunistic attacks targeting unpatched systems.
Potential Impact
For European organizations using code-projects Modern Bag 1.0, this vulnerability poses a risk of unauthorized access to sensitive customer or organizational data stored in backend databases. Exploitation could lead to data breaches, loss of data integrity, and potential disruption of customer communication channels. Organizations in sectors with strict data protection regulations, such as GDPR, could face compliance violations and reputational damage if personal data is exposed. The remote and unauthenticated nature of the vulnerability increases the likelihood of exploitation, especially in environments where the application is internet-facing. Additionally, attackers could leverage this vulnerability as a foothold for further lateral movement within the network. The medium severity rating suggests that while the impact is not catastrophic, the risk is significant enough to warrant prompt remediation to prevent data compromise and service disruption.
Mitigation Recommendations
Organizations should immediately audit their use of code-projects Modern Bag version 1.0 and prioritize upgrading to a patched version once available. In the absence of an official patch, temporary mitigations include implementing web application firewall (WAF) rules to detect and block SQL injection patterns targeting the 'contact-name' parameter in /contact-back.php. Input validation and parameterized queries should be enforced at the application level to sanitize user inputs rigorously. Network segmentation and restricting access to the application backend can reduce exposure. Regular monitoring of logs for suspicious query patterns and anomalous database activity is recommended. Additionally, organizations should conduct penetration testing focused on injection flaws to identify similar vulnerabilities. Finally, maintaining an incident response plan to quickly address any exploitation attempts is critical.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-07-11T20:48:59.910Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68731deda83201eaacb71c53
Added to database: 7/13/2025, 2:46:05 AM
Last enriched: 7/20/2025, 9:02:08 PM
Last updated: 8/23/2025, 11:39:29 PM
Views: 37
Related Threats
CVE-2025-9523: Stack-based Buffer Overflow in Tenda AC1206
CriticalCVE-2025-30064: CWE-912 Hidden Functionality in CGM CGM CLININET
HighCVE-2025-30063: CWE-732 Incorrect Permission Assignment for Critical Resource in CGM CGM CLININET
CriticalCVE-2025-30061: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in CGM CGM CLININET
MediumCVE-2025-30060: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in CGM CGM CLININET
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.