CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Lifecycle Timeline
4Description
A vulnerability classified as critical was found in code-projects Online Bidding System 1.0. Affected by this vulnerability is an unknown functionality of the file /administrator. The manipulation of the argument aduser leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Analysis
CVE-2025-6471 is a critical SQL injection vulnerability in code-projects Online Bidding System version 1.0 affecting the /administrator endpoint, where the 'aduser' parameter is not properly sanitized. An unauthenticated remote attacker can exploit this to execute arbitrary SQL queries, potentially leading to unauthorized data access, modification, or deletion. Public exploit code is available and the vulnerability is actively exploitable with no authentication required.
Technical Context
The vulnerability is a classic SQL injection flaw (CWE-74: Improper Neutralization of Special Elements used in an SQL Command) in the /administrator file of the Online Bidding System. The 'aduser' parameter is concatenated directly into SQL queries without parameterized statements or input validation. This allows attackers to inject malicious SQL syntax to bypass authentication, extract sensitive data from backend databases, or manipulate database records. The affected software is a web-based bidding platform built on unknown technology stack; the lack of input sanitization in an administrative endpoint suggests potentially legacy or poorly secured code architecture.
Affected Products
code-projects Online Bidding System version 1.0 - all installations. Specific affected component: /administrator endpoint with vulnerable 'aduser' parameter handling. CPE identifier would be: cpe:2.3:a:code-projects:online_bidding_system:1.0:*:*:*:*:*:*:* (assuming standard vendor/product naming). No patch version information provided in available references; confirm with vendor for patched release availability.
Remediation
Immediate actions: (1) Implement parameterized queries (prepared statements) for all database interactions in the /administrator endpoint; (2) Apply strict input validation and whitelisting for the 'aduser' parameter (alphanumeric only, length limits); (3) Implement Web Application Firewall (WAF) rules to block SQL injection patterns in the /administrator path; (4) Apply principle of least privilege to database user accounts; (5) Contact code-projects vendor immediately for security patch or version upgrade; (6) If patch unavailable, implement network segmentation to restrict /administrator access to trusted IP ranges only; (7) Monitor database logs for SQL injection attempts and unauthorized queries; (8) Conduct full code audit of input handling across the application. Vendor patch status: Unknown—verify with code-projects for CVE-2025-6471 patch availability and release timeline.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-18841