Skip to main content

CVE-2025-7605: SQL Injection in code-projects AVL Rooms

Medium
VulnerabilityCVE-2025-7605cvecve-2025-7605
Published: Mon Jul 14 2025 (07/14/2025, 12:44:05 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: AVL Rooms

Description

A vulnerability was found in code-projects AVL Rooms 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /profile.php. The manipulation of the argument first_name leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/14/2025, 13:16:27 UTC

Technical Analysis

CVE-2025-7605 is a critical SQL Injection vulnerability identified in version 1.0 of the AVL Rooms application developed by code-projects. The vulnerability exists in the /profile.php file, specifically through the manipulation of the 'first_name' parameter. An attacker can remotely exploit this flaw without requiring authentication or user interaction, by injecting malicious SQL code into the input field. This can lead to unauthorized access or modification of the backend database, potentially exposing sensitive user data or allowing further compromise of the application environment. The vulnerability has been publicly disclosed, increasing the risk of exploitation, although no known exploits have been observed in the wild yet. The CVSS 4.0 base score is 6.9, indicating a medium severity rating, reflecting the ease of remote exploitation and the potential impact on confidentiality, integrity, and availability, albeit with limited scope and impact vectors. The vulnerability does not require privileges or user interaction, making it more accessible to attackers. However, the impact is somewhat limited by the vulnerability's scope and the lack of known exploits so far. The absence of patches or mitigation links suggests that the vendor has not yet released an official fix, increasing the urgency for organizations to implement protective measures.

Potential Impact

For European organizations using AVL Rooms 1.0, this vulnerability poses a significant risk to the confidentiality and integrity of their data. Exploitation could lead to unauthorized data disclosure, data manipulation, or even full database compromise, which can disrupt business operations and damage reputation. Given that AVL Rooms is likely used for room or resource management, sensitive personal or organizational information could be exposed. The remote and unauthenticated nature of the exploit increases the threat surface, potentially allowing attackers to target multiple organizations without prior access. This could be particularly impactful for sectors with strict data protection regulations such as GDPR, where data breaches can result in heavy fines and legal consequences. Additionally, compromised systems could be leveraged as pivot points for further attacks within an organization's network, increasing the overall risk posture.

Mitigation Recommendations

Since no official patches are currently available, European organizations should immediately implement input validation and sanitization on the 'first_name' parameter within /profile.php to prevent SQL injection. Employing Web Application Firewalls (WAFs) with rules specifically designed to detect and block SQL injection attempts targeting this parameter can provide an effective temporary defense. Organizations should also conduct thorough code reviews and penetration testing focused on input handling in AVL Rooms. Restricting database permissions to the minimum necessary for application operation can limit the damage if exploitation occurs. Monitoring logs for unusual database queries or errors related to /profile.php can help detect attempted exploitation. Finally, organizations should engage with the vendor to obtain patches or updates and plan for prompt application once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-13T14:39:29.334Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6874ff8ea83201eaacc68960

Added to database: 7/14/2025, 1:01:02 PM

Last enriched: 7/14/2025, 1:16:27 PM

Last updated: 7/16/2025, 12:55:54 PM

Views: 5

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats