CVE-2025-6612

| EUVD-2025-19109 HIGH
2025-06-25 [email protected]
7.3
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low

Lifecycle Timeline

4
Analysis Generated
Mar 15, 2026 - 23:19 vuln.today
EUVD ID Assigned
Mar 15, 2026 - 23:19 euvd
EUVD-2025-19109
PoC Detected
Jun 27, 2025 - 18:22 vuln.today
Public exploit code
CVE Published
Jun 25, 2025 - 16:15 nvd
HIGH 7.3

Description

A vulnerability was found in code-projects Inventory Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /php_action/removeCategories.php. The manipulation of the argument categoriesId leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

Analysis

CVE-2025-6612 is a critical SQL injection vulnerability in code-projects Inventory Management System 1.0 affecting the /php_action/removeCategories.php endpoint. An unauthenticated remote attacker can manipulate the 'categoriesId' parameter to execute arbitrary SQL queries, potentially leading to unauthorized data access, modification, or deletion. The vulnerability has been publicly disclosed with exploit code available and demonstrates active exploitation potential with a CVSS 7.3 score indicating moderate-to-high severity.

Technical Context

This vulnerability exists in a PHP-based Inventory Management System where user-supplied input (categoriesId parameter) is improperly validated and directly incorporated into SQL queries without parameterized prepared statements or proper escaping. The root cause is classified under CWE-74 (Improper Neutralization of Special Elements in Output Used by a Downstream Component), representing a classic SQL injection flaw. The vulnerable endpoint /php_action/removeCategories.php processes category deletion operations, and the lack of input sanitization allows attackers to break out of intended SQL syntax and inject malicious SQL commands. The absence of stored procedures or parameterized queries indicates the code likely uses string concatenation for query building.

Affected Products

Product: code-projects Inventory Management System; Affected Version: 1.0; Vulnerable Component: /php_action/removeCategories.php; Parameter: categoriesId. No specific CPE identifier was provided in standard sources, but the product can be referenced as: code-projects Inventory Management System v1.0. Affected organizations likely include small-to-medium businesses using this open-source or commercial inventory solution. The lack of version specification for patched releases suggests either: (a) no patch has been released by the vendor, or (b) the vendor has not issued a formal advisory. Organizations running version 1.0 should be considered at immediate risk.

Remediation

Immediate actions: (1) Implement input validation on the categoriesId parameter - whitelist only valid numeric identifiers and reject any input containing SQL metacharacters; (2) Use parameterized prepared statements (prepared queries with bound parameters) for all database interactions in removeCategories.php; (3) Apply principle of least privilege to database user accounts - ensure the PHP application's database credentials have minimal required permissions; (4) Implement Web Application Firewall (WAF) rules to detect and block common SQL injection patterns in category-related parameters; (5) Upgrade to patched version if available from code-projects vendor (check project repository/advisory page); (6) As interim mitigation, disable or restrict access to /php_action/removeCategories.php at the web server level using .htaccess or nginx configuration if the functionality is not immediately required. Long-term: refactor the entire application to use an ORM framework (Laravel Eloquent, Doctrine) that enforces parameterized queries by default.

Priority Score

57
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +36
POC: +20

Share

CVE-2025-6612 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy