CVE-2025-7749: SQL Injection in code-projects Online Appointment Booking System
A vulnerability, which was classified as critical, has been found in code-projects Online Appointment Booking System 1.0. This issue affects some unknown processing of the file /admin/getmanagerregion.php. The manipulation of the argument city leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-7749 is a critical SQL Injection vulnerability identified in version 1.0 of the code-projects Online Appointment Booking System. The vulnerability resides in the /admin/getmanagerregion.php file, specifically in the processing of the 'city' parameter. An attacker can remotely manipulate this parameter to inject malicious SQL code, potentially allowing unauthorized access to or modification of the backend database. The vulnerability requires no authentication or user interaction, making it remotely exploitable over the network. The CVSS 4.0 base score is 6.9, indicating a medium severity level, with the vector string showing no privileges required (PR:N), no user interaction (UI:N), and network attack vector (AV:N). The impact on confidentiality, integrity, and availability is low to limited, suggesting that while exploitation is feasible, the extent of damage may be constrained by the application’s architecture or database permissions. No known exploits are currently reported in the wild, and no official patches have been published yet. The vulnerability disclosure is recent, dated July 17, 2025. Given the nature of appointment booking systems, which often handle sensitive personal data and scheduling information, exploitation could lead to unauthorized data disclosure, data tampering, or disruption of service, affecting business operations and user trust.
Potential Impact
For European organizations using the code-projects Online Appointment Booking System version 1.0, this vulnerability poses a significant risk to the confidentiality and integrity of customer and operational data. Appointment systems often store personally identifiable information (PII), including names, contact details, and appointment histories, which are protected under GDPR. Exploitation could lead to data breaches, resulting in regulatory penalties and reputational damage. Additionally, attackers could manipulate appointment data, causing operational disruptions or denial of service to legitimate users. The remote and unauthenticated nature of the exploit increases the risk of widespread attacks, especially if the system is exposed to the internet without adequate network protections. European healthcare providers, service companies, and public sector entities relying on this software could face compliance issues and service interruptions, impacting citizens and customers. The medium CVSS score reflects a moderate but actionable threat that requires prompt attention to prevent escalation.
Mitigation Recommendations
European organizations should immediately conduct an inventory to identify deployments of code-projects Online Appointment Booking System version 1.0. Until an official patch is released, implement strict input validation and sanitization on the 'city' parameter at the web application firewall (WAF) or reverse proxy level to block SQL injection payloads. Employ parameterized queries or prepared statements if source code access is available to developers. Restrict access to the /admin/getmanagerregion.php endpoint via network segmentation and IP whitelisting to limit exposure. Monitor web server and database logs for unusual query patterns indicative of injection attempts. Conduct regular security assessments and penetration testing focused on injection flaws. Educate administrators on the risks and signs of exploitation. Once a vendor patch is available, prioritize its deployment. Additionally, ensure that database accounts used by the application have the least privileges necessary to limit the impact of any successful injection.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2025-7749: SQL Injection in code-projects Online Appointment Booking System
Description
A vulnerability, which was classified as critical, has been found in code-projects Online Appointment Booking System 1.0. This issue affects some unknown processing of the file /admin/getmanagerregion.php. The manipulation of the argument city leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-7749 is a critical SQL Injection vulnerability identified in version 1.0 of the code-projects Online Appointment Booking System. The vulnerability resides in the /admin/getmanagerregion.php file, specifically in the processing of the 'city' parameter. An attacker can remotely manipulate this parameter to inject malicious SQL code, potentially allowing unauthorized access to or modification of the backend database. The vulnerability requires no authentication or user interaction, making it remotely exploitable over the network. The CVSS 4.0 base score is 6.9, indicating a medium severity level, with the vector string showing no privileges required (PR:N), no user interaction (UI:N), and network attack vector (AV:N). The impact on confidentiality, integrity, and availability is low to limited, suggesting that while exploitation is feasible, the extent of damage may be constrained by the application’s architecture or database permissions. No known exploits are currently reported in the wild, and no official patches have been published yet. The vulnerability disclosure is recent, dated July 17, 2025. Given the nature of appointment booking systems, which often handle sensitive personal data and scheduling information, exploitation could lead to unauthorized data disclosure, data tampering, or disruption of service, affecting business operations and user trust.
Potential Impact
For European organizations using the code-projects Online Appointment Booking System version 1.0, this vulnerability poses a significant risk to the confidentiality and integrity of customer and operational data. Appointment systems often store personally identifiable information (PII), including names, contact details, and appointment histories, which are protected under GDPR. Exploitation could lead to data breaches, resulting in regulatory penalties and reputational damage. Additionally, attackers could manipulate appointment data, causing operational disruptions or denial of service to legitimate users. The remote and unauthenticated nature of the exploit increases the risk of widespread attacks, especially if the system is exposed to the internet without adequate network protections. European healthcare providers, service companies, and public sector entities relying on this software could face compliance issues and service interruptions, impacting citizens and customers. The medium CVSS score reflects a moderate but actionable threat that requires prompt attention to prevent escalation.
Mitigation Recommendations
European organizations should immediately conduct an inventory to identify deployments of code-projects Online Appointment Booking System version 1.0. Until an official patch is released, implement strict input validation and sanitization on the 'city' parameter at the web application firewall (WAF) or reverse proxy level to block SQL injection payloads. Employ parameterized queries or prepared statements if source code access is available to developers. Restrict access to the /admin/getmanagerregion.php endpoint via network segmentation and IP whitelisting to limit exposure. Monitor web server and database logs for unusual query patterns indicative of injection attempts. Conduct regular security assessments and penetration testing focused on injection flaws. Educate administrators on the risks and signs of exploitation. Once a vendor patch is available, prioritize its deployment. Additionally, ensure that database accounts used by the application have the least privileges necessary to limit the impact of any successful injection.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-07-17T10:33:20.286Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68793deba83201eaace7fc69
Added to database: 7/17/2025, 6:16:11 PM
Last enriched: 7/17/2025, 6:31:14 PM
Last updated: 7/28/2025, 7:02:47 PM
Views: 17
Related Threats
CVE-2025-8353: CWE-446: UI Discrepancy for Security Feature in Devolutions Server
UnknownCVE-2025-8312: CWE-833: Deadlock in Devolutions Server
UnknownCVE-2025-54656: CWE-117 Improper Output Neutralization for Logs in Apache Software Foundation Apache Struts Extras
MediumCVE-2025-50578: n/a
CriticalCVE-2025-8292: Use after free in Google Chrome
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.