CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Lifecycle Timeline
4Description
A vulnerability was found in CodeAstro Real Estate Management System 1.0. It has been classified as critical. This affects an unknown part of the file /login.php. The manipulation of the argument email leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Analysis
Critical SQL injection vulnerability in CodeAstro Real Estate Management System version 1.0, affecting the /login.php file's email parameter. An unauthenticated remote attacker can inject malicious SQL commands through the email input field to read, modify, or delete database records, potentially leading to unauthorized access, data exfiltration, and system compromise. The vulnerability has been publicly disclosed with proof-of-concept code available, creating significant real-world exploitation risk.
Technical Context
The vulnerability is a classic SQL injection flaw (CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component) in the login authentication mechanism. The /login.php endpoint fails to properly sanitize or parameterize user input in the email parameter before incorporating it into SQL database queries. Rather than using prepared statements or parameterized queries, the application likely concatenates user input directly into SQL WHERE clauses (e.g., 'SELECT * FROM users WHERE email = "' + user_input + '"'), allowing attackers to break out of the intended query structure and execute arbitrary SQL. The affected product is CodeAstro Real Estate Management System 1.0, a PHP-based web application for managing real estate operations. The root cause stems from inadequate input validation and the absence of output encoding mechanisms typical of CWE-74 classifications.
Affected Products
CodeAstro Real Estate Management System version 1.0 (all installations). CPE representation: cpe:2.3:a:codeastro:real_estate_management_system:1.0:*:*:*:*:*:*:*. The vulnerability impacts any deployment of this software version running PHP with database backend (likely MySQL/MariaDB based on typical REMS architectures). Affected component: /login.php file, specifically the email parameter processing routine. No vendor advisory URL was provided in the source data; organizations must check CodeAstro's official security channels or repository for patched versions.
Remediation
Immediate actions: (1) Apply security patches—upgrade CodeAstro Real Estate Management System to version 1.1 or later once available; contact CodeAstro support for emergency patching timeline; (2) Interim mitigations: implement Web Application Firewall (WAF) rules blocking SQL keywords in email parameters ('UNION', 'SELECT', 'DROP', etc.), enforce strict input validation regex for email format (^[a-zA-Z0-9._%+-]+@[a-zA-Z0-9.-]+\.[a-zA-Z]{2,}$); (3) Implement prepared statements/parameterized queries in login.php using PHP PDO or MySQLi prepared statements instead of string concatenation; (4) Apply principle of least privilege to database user accounts running queries; (5) Enable SQL error suppression to prevent information leakage; (6) Deploy intrusion detection signatures for SQL injection patterns on login endpoints. Long-term: conduct code review of all user input handling, implement OWASP Top 10 secure coding practices, deploy static application security testing (SAST) in development pipeline.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-16861