CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Lifecycle Timeline
4Tags
Description
A vulnerability classified as critical has been found in code-projects Online Bidding System 1.0. Affected is an unknown function of the file /bidlog.php. The manipulation of the argument ID leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
Analysis
CVE-2025-6470 is a critical SQL injection vulnerability in code-projects Online Bidding System 1.0, specifically in the /bidlog.php file's ID parameter, allowing unauthenticated remote attackers to execute arbitrary SQL queries. The vulnerability has been publicly disclosed with proof-of-concept code available, presenting immediate exploitation risk. With a CVSS score of 7.3 and network-accessible attack vector requiring no authentication, this poses significant risk to confidentiality, integrity, and availability of affected systems.
Technical Context
The vulnerability stems from CWE-74 (Improper Neutralization of Special Elements in Output Used by a Downstream Component - 'Injection'), manifesting as SQL injection in a PHP-based web application. The /bidlog.php file fails to properly sanitize or parameterize the 'ID' parameter before incorporating it into SQL queries, allowing attackers to manipulate query logic. This is a classic first-order SQL injection vulnerability in a server-side PHP component. The affected product is code-projects Online Bidding System version 1.0, a web-based application handling auction/bidding functionality. CPE likely maps to vendor 'code-projects' with product identifier 'online_bidding_system' at version '1.0'.
Affected Products
- vendor: code-projects; product: Online Bidding System; version: 1.0; component: /bidlog.php; vulnerable_parameter: ID; cpe: cpe:2.3:a:code-projects:online_bidding_system:1.0:*:*:*:*:*:*:*
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-18839