CVE-2025-7517: SQL Injection in code-projects Online Appointment Booking System
A vulnerability, which was classified as critical, has been found in code-projects Online Appointment Booking System 1.0. This issue affects some unknown processing of the file /getDay.php. The manipulation of the argument cidval leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-7517 is a critical SQL Injection vulnerability identified in version 1.0 of the code-projects Online Appointment Booking System. The vulnerability arises from improper sanitization of the 'cidval' parameter in the /getDay.php endpoint, allowing an attacker to inject malicious SQL code remotely without any authentication or user interaction. Exploiting this flaw enables an attacker to manipulate backend database queries, potentially leading to unauthorized data access, data modification, or even complete compromise of the underlying database. The vulnerability is remotely exploitable over the network with low attack complexity and no privileges required, which increases the risk of exploitation. Although the CVSS 4.0 score is 6.9 (medium severity), the nature of SQL injection vulnerabilities typically warrants heightened concern due to the potential for data breaches and system compromise. The vulnerability affects only version 1.0 of the product, and no official patches or mitigations have been published yet. There are no known exploits in the wild at the time of reporting, but public disclosure of the exploit code increases the risk of imminent attacks. The vulnerability impacts confidentiality, integrity, and availability of the affected system's data, with partial impact on each (low to medium impact on confidentiality, integrity, and availability).
Potential Impact
For European organizations using the code-projects Online Appointment Booking System version 1.0, this vulnerability poses significant risks. Appointment booking systems often handle sensitive personal data, including client identities, contact information, appointment details, and potentially payment information. Exploitation could lead to unauthorized data disclosure violating GDPR and other data protection regulations, resulting in legal penalties and reputational damage. Attackers could also manipulate appointment data, causing operational disruptions and loss of trust. Given the remote and unauthenticated nature of the exploit, attackers can target vulnerable systems en masse, increasing the risk of widespread compromise. The medium CVSS score may underestimate the real-world impact, as SQL injection can be leveraged for privilege escalation or pivoting within networks. Organizations relying on this software for customer-facing services may face service interruptions and data breaches, impacting business continuity and customer confidence.
Mitigation Recommendations
Immediate mitigation steps include: 1) Restricting network access to the /getDay.php endpoint by implementing web application firewalls (WAFs) with SQL injection detection and blocking rules tailored to the 'cidval' parameter. 2) Applying input validation and parameterized queries or prepared statements in the codebase to sanitize the 'cidval' parameter and prevent injection. 3) If source code modification is not immediately possible, deploying virtual patching via WAF or reverse proxy rules to block suspicious payloads targeting 'cidval'. 4) Conducting thorough security testing and code review of the appointment booking system to identify and remediate similar injection points. 5) Monitoring logs for unusual query patterns or repeated access attempts to /getDay.php. 6) Planning for an upgrade or patch deployment from the vendor once available. 7) Implementing strict database user permissions to limit the impact of any successful injection. 8) Educating IT and security teams about the vulnerability and ensuring incident response readiness.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden
CVE-2025-7517: SQL Injection in code-projects Online Appointment Booking System
Description
A vulnerability, which was classified as critical, has been found in code-projects Online Appointment Booking System 1.0. This issue affects some unknown processing of the file /getDay.php. The manipulation of the argument cidval leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-7517 is a critical SQL Injection vulnerability identified in version 1.0 of the code-projects Online Appointment Booking System. The vulnerability arises from improper sanitization of the 'cidval' parameter in the /getDay.php endpoint, allowing an attacker to inject malicious SQL code remotely without any authentication or user interaction. Exploiting this flaw enables an attacker to manipulate backend database queries, potentially leading to unauthorized data access, data modification, or even complete compromise of the underlying database. The vulnerability is remotely exploitable over the network with low attack complexity and no privileges required, which increases the risk of exploitation. Although the CVSS 4.0 score is 6.9 (medium severity), the nature of SQL injection vulnerabilities typically warrants heightened concern due to the potential for data breaches and system compromise. The vulnerability affects only version 1.0 of the product, and no official patches or mitigations have been published yet. There are no known exploits in the wild at the time of reporting, but public disclosure of the exploit code increases the risk of imminent attacks. The vulnerability impacts confidentiality, integrity, and availability of the affected system's data, with partial impact on each (low to medium impact on confidentiality, integrity, and availability).
Potential Impact
For European organizations using the code-projects Online Appointment Booking System version 1.0, this vulnerability poses significant risks. Appointment booking systems often handle sensitive personal data, including client identities, contact information, appointment details, and potentially payment information. Exploitation could lead to unauthorized data disclosure violating GDPR and other data protection regulations, resulting in legal penalties and reputational damage. Attackers could also manipulate appointment data, causing operational disruptions and loss of trust. Given the remote and unauthenticated nature of the exploit, attackers can target vulnerable systems en masse, increasing the risk of widespread compromise. The medium CVSS score may underestimate the real-world impact, as SQL injection can be leveraged for privilege escalation or pivoting within networks. Organizations relying on this software for customer-facing services may face service interruptions and data breaches, impacting business continuity and customer confidence.
Mitigation Recommendations
Immediate mitigation steps include: 1) Restricting network access to the /getDay.php endpoint by implementing web application firewalls (WAFs) with SQL injection detection and blocking rules tailored to the 'cidval' parameter. 2) Applying input validation and parameterized queries or prepared statements in the codebase to sanitize the 'cidval' parameter and prevent injection. 3) If source code modification is not immediately possible, deploying virtual patching via WAF or reverse proxy rules to block suspicious payloads targeting 'cidval'. 4) Conducting thorough security testing and code review of the appointment booking system to identify and remediate similar injection points. 5) Monitoring logs for unusual query patterns or repeated access attempts to /getDay.php. 6) Planning for an upgrade or patch deployment from the vendor once available. 7) Implementing strict database user permissions to limit the impact of any successful injection. 8) Educating IT and security teams about the vulnerability and ensuring incident response readiness.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-07-11T20:51:04.020Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68733a0da83201eaacb79a33
Added to database: 7/13/2025, 4:46:05 AM
Last enriched: 7/20/2025, 9:03:19 PM
Last updated: 8/24/2025, 6:04:31 PM
Views: 38
Related Threats
CVE-2025-5514: CWE-130 Improper Handling of Length Parameter Inconsistency in Mitsubishi Electric Corporation MELSEC iQ-F Series FX5U-32MT/ES
MediumCVE-2025-9406: Unrestricted Upload in xuhuisheng lemon
MediumCVE-2025-9405: Reachable Assertion in Open5GS
MediumCVE-2025-9404: Cross Site Scripting in Scada-LTS
MediumCVE-2025-9403: Reachable Assertion in jqlang jq
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.