Skip to main content

CVE-2025-7517: SQL Injection in code-projects Online Appointment Booking System

Medium
VulnerabilityCVE-2025-7517cvecve-2025-7517
Published: Sun Jul 13 2025 (07/13/2025, 04:32:05 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Online Appointment Booking System

Description

A vulnerability, which was classified as critical, has been found in code-projects Online Appointment Booking System 1.0. This issue affects some unknown processing of the file /getDay.php. The manipulation of the argument cidval leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/20/2025, 21:03:19 UTC

Technical Analysis

CVE-2025-7517 is a critical SQL Injection vulnerability identified in version 1.0 of the code-projects Online Appointment Booking System. The vulnerability arises from improper sanitization of the 'cidval' parameter in the /getDay.php endpoint, allowing an attacker to inject malicious SQL code remotely without any authentication or user interaction. Exploiting this flaw enables an attacker to manipulate backend database queries, potentially leading to unauthorized data access, data modification, or even complete compromise of the underlying database. The vulnerability is remotely exploitable over the network with low attack complexity and no privileges required, which increases the risk of exploitation. Although the CVSS 4.0 score is 6.9 (medium severity), the nature of SQL injection vulnerabilities typically warrants heightened concern due to the potential for data breaches and system compromise. The vulnerability affects only version 1.0 of the product, and no official patches or mitigations have been published yet. There are no known exploits in the wild at the time of reporting, but public disclosure of the exploit code increases the risk of imminent attacks. The vulnerability impacts confidentiality, integrity, and availability of the affected system's data, with partial impact on each (low to medium impact on confidentiality, integrity, and availability).

Potential Impact

For European organizations using the code-projects Online Appointment Booking System version 1.0, this vulnerability poses significant risks. Appointment booking systems often handle sensitive personal data, including client identities, contact information, appointment details, and potentially payment information. Exploitation could lead to unauthorized data disclosure violating GDPR and other data protection regulations, resulting in legal penalties and reputational damage. Attackers could also manipulate appointment data, causing operational disruptions and loss of trust. Given the remote and unauthenticated nature of the exploit, attackers can target vulnerable systems en masse, increasing the risk of widespread compromise. The medium CVSS score may underestimate the real-world impact, as SQL injection can be leveraged for privilege escalation or pivoting within networks. Organizations relying on this software for customer-facing services may face service interruptions and data breaches, impacting business continuity and customer confidence.

Mitigation Recommendations

Immediate mitigation steps include: 1) Restricting network access to the /getDay.php endpoint by implementing web application firewalls (WAFs) with SQL injection detection and blocking rules tailored to the 'cidval' parameter. 2) Applying input validation and parameterized queries or prepared statements in the codebase to sanitize the 'cidval' parameter and prevent injection. 3) If source code modification is not immediately possible, deploying virtual patching via WAF or reverse proxy rules to block suspicious payloads targeting 'cidval'. 4) Conducting thorough security testing and code review of the appointment booking system to identify and remediate similar injection points. 5) Monitoring logs for unusual query patterns or repeated access attempts to /getDay.php. 6) Planning for an upgrade or patch deployment from the vendor once available. 7) Implementing strict database user permissions to limit the impact of any successful injection. 8) Educating IT and security teams about the vulnerability and ensuring incident response readiness.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-11T20:51:04.020Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68733a0da83201eaacb79a33

Added to database: 7/13/2025, 4:46:05 AM

Last enriched: 7/20/2025, 9:03:19 PM

Last updated: 8/24/2025, 6:04:31 PM

Views: 38

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats