CVE-2025-7517: SQL Injection in code-projects Online Appointment Booking System
A vulnerability, which was classified as critical, has been found in code-projects Online Appointment Booking System 1.0. This issue affects some unknown processing of the file /getDay.php. The manipulation of the argument cidval leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-7517 is a critical SQL Injection vulnerability identified in version 1.0 of the code-projects Online Appointment Booking System. The vulnerability arises from improper sanitization of the 'cidval' parameter in the /getDay.php endpoint, allowing an attacker to inject malicious SQL code remotely without any authentication or user interaction. Exploiting this flaw could enable an attacker to manipulate backend database queries, potentially leading to unauthorized data access, data modification, or even complete compromise of the database. The vulnerability has been publicly disclosed, increasing the risk of exploitation, although no confirmed exploits have been observed in the wild yet. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the network attack vector, low complexity, no privileges or user interaction required, but with limited impact on confidentiality, integrity, and availability. The vulnerability affects only version 1.0 of the product, which is an online appointment booking system commonly used by organizations to manage scheduling and client appointments.
Potential Impact
For European organizations using the affected Online Appointment Booking System version 1.0, this vulnerability poses a significant risk to the confidentiality and integrity of client and organizational data. Successful exploitation could lead to unauthorized disclosure of sensitive appointment and client information, manipulation or deletion of booking data, and potential disruption of scheduling services. This could result in reputational damage, regulatory non-compliance (especially under GDPR), and operational downtime. Since the system is often integrated with customer management workflows, the impact could cascade into other business processes. The public disclosure of the vulnerability increases the urgency for European entities to assess and remediate the issue promptly to prevent potential data breaches or service interruptions.
Mitigation Recommendations
Given the absence of an official patch, European organizations should immediately implement the following mitigations: 1) Apply input validation and sanitization on the 'cidval' parameter at the web application firewall (WAF) or reverse proxy level to block malicious SQL payloads. 2) Employ parameterized queries or prepared statements in the application code to prevent SQL injection if source code access and modification are possible. 3) Restrict database user permissions to the minimum necessary to limit the impact of a successful injection. 4) Monitor web server and database logs for suspicious activities targeting /getDay.php or unusual query patterns. 5) Consider temporarily disabling or restricting access to the vulnerable endpoint until a vendor patch or update is available. 6) Conduct a thorough security review of the entire appointment booking system to identify and remediate other potential injection points. 7) Educate IT and security teams about the vulnerability and ensure incident response plans are updated to handle potential exploitation scenarios.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden
CVE-2025-7517: SQL Injection in code-projects Online Appointment Booking System
Description
A vulnerability, which was classified as critical, has been found in code-projects Online Appointment Booking System 1.0. This issue affects some unknown processing of the file /getDay.php. The manipulation of the argument cidval leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-7517 is a critical SQL Injection vulnerability identified in version 1.0 of the code-projects Online Appointment Booking System. The vulnerability arises from improper sanitization of the 'cidval' parameter in the /getDay.php endpoint, allowing an attacker to inject malicious SQL code remotely without any authentication or user interaction. Exploiting this flaw could enable an attacker to manipulate backend database queries, potentially leading to unauthorized data access, data modification, or even complete compromise of the database. The vulnerability has been publicly disclosed, increasing the risk of exploitation, although no confirmed exploits have been observed in the wild yet. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the network attack vector, low complexity, no privileges or user interaction required, but with limited impact on confidentiality, integrity, and availability. The vulnerability affects only version 1.0 of the product, which is an online appointment booking system commonly used by organizations to manage scheduling and client appointments.
Potential Impact
For European organizations using the affected Online Appointment Booking System version 1.0, this vulnerability poses a significant risk to the confidentiality and integrity of client and organizational data. Successful exploitation could lead to unauthorized disclosure of sensitive appointment and client information, manipulation or deletion of booking data, and potential disruption of scheduling services. This could result in reputational damage, regulatory non-compliance (especially under GDPR), and operational downtime. Since the system is often integrated with customer management workflows, the impact could cascade into other business processes. The public disclosure of the vulnerability increases the urgency for European entities to assess and remediate the issue promptly to prevent potential data breaches or service interruptions.
Mitigation Recommendations
Given the absence of an official patch, European organizations should immediately implement the following mitigations: 1) Apply input validation and sanitization on the 'cidval' parameter at the web application firewall (WAF) or reverse proxy level to block malicious SQL payloads. 2) Employ parameterized queries or prepared statements in the application code to prevent SQL injection if source code access and modification are possible. 3) Restrict database user permissions to the minimum necessary to limit the impact of a successful injection. 4) Monitor web server and database logs for suspicious activities targeting /getDay.php or unusual query patterns. 5) Consider temporarily disabling or restricting access to the vulnerable endpoint until a vendor patch or update is available. 6) Conduct a thorough security review of the entire appointment booking system to identify and remediate other potential injection points. 7) Educate IT and security teams about the vulnerability and ensure incident response plans are updated to handle potential exploitation scenarios.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-07-11T20:51:04.020Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68733a0da83201eaacb79a33
Added to database: 7/13/2025, 4:46:05 AM
Last enriched: 7/13/2025, 5:01:07 AM
Last updated: 7/13/2025, 5:59:30 AM
Views: 3
Related Threats
CVE-2025-7527: Stack-based Buffer Overflow in Tenda FH1202
HighCVE-2025-7525: Command Injection in TOTOLINK T6
MediumCVE-2025-7524: Command Injection in TOTOLINK T6
MediumCVE-2025-7012: CWE-59 Improper Link Resolution Before File Access ('Link Following') in Cato Networks Cato Client
HighCVE-2025-7523: XML External Entity Reference in Jinher OA
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.