CVE-2025-7409

| EUVD-2025-21023 HIGH
2025-07-10 [email protected]
7.3
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low

Lifecycle Timeline

4
Analysis Generated
Mar 16, 2026 - 06:52 vuln.today
EUVD ID Assigned
Mar 16, 2026 - 06:52 euvd
EUVD-2025-21023
PoC Detected
Jul 16, 2025 - 15:03 vuln.today
Public exploit code
CVE Published
Jul 10, 2025 - 17:15 nvd
HIGH 7.3

Description

A vulnerability was found in code-projects Mobile Shop 1.0 and classified as critical. This issue affects some unknown processing of the file /LoginAsAdmin.php. The manipulation of the argument email leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

Analysis

CVE-2025-7409 is a critical SQL injection vulnerability in code-projects Mobile Shop 1.0 affecting the /LoginAsAdmin.php endpoint, where the 'email' parameter is improperly sanitized, allowing unauthenticated remote attackers to inject arbitrary SQL commands. The vulnerability has been publicly disclosed with exploits available, making it actively exploitable in the wild. With a CVSS score of 7.3 and network-accessible attack vector, this poses significant risk to confidentiality, integrity, and availability of affected systems.

Technical Context

The vulnerability exists in the /LoginAsAdmin.php file of code-projects Mobile Shop 1.0, a PHP-based e-commerce application. The root cause is CWE-74 (Improper Neutralization of Special Elements in Output Used by a Downstream Component), which manifests as SQL injection through inadequate input validation/parameterization on the 'email' parameter in admin login processing. The application fails to use prepared statements or proper escaping mechanisms when constructing SQL queries, allowing attackers to inject malicious SQL syntax directly into database queries. This is a classic authentication bypass and data exfiltration vector in PHP applications lacking parameterized queries (mysqli prepared statements, PDO prepared statements, or ORM frameworks).

Affected Products

code-projects Mobile Shop version 1.0 specifically in the /LoginAsAdmin.php component. CPE data would typically be: cpe:2.3:a:code-projects:mobile_shop:1.0:*:*:*:*:*:*:*. Affected configurations include all installations of Mobile Shop 1.0 with default or unpatched deployment. The vulnerability affects the authentication system module, making any instance accessible via HTTP/HTTPS at risk. No indication of patched versions (e.g., 1.1+) is provided in available intelligence, suggesting the product may be abandoned or patch status is unknown.

Remediation

Immediate actions: (1) Upgrade to patched version if available from code-projects (vendor advisory/patch status unknown from provided data—contact vendor directly); (2) If no patch exists, implement Web Application Firewall (WAF) rules to block SQL injection payloads in email parameter (detect patterns: UNION, OR 1=1, --, ;, xp_, etc.); (3) Disable or restrict access to /LoginAsAdmin.php via IP whitelisting or authentication gateway; (4) Implement input validation: whitelist email format validation (RFC 5322 compliant regex), reject non-alphanumeric/special-char patterns before query; (5) Code-level fix (if patching source): convert all SQL queries to parameterized statements using prepared statements (mysqli_prepare + mysqli_bind_param or PDO prepared statements); (6) Enable SQL error suppression to prevent information disclosure; (7) Conduct security audit of other endpoints for similar SQL injection vectors; (8) Monitor database logs for suspicious query patterns. Long-term: Consider sunsetting Mobile Shop 1.0 in favor of actively maintained e-commerce platforms.

Priority Score

57
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +36
POC: +20

Share

CVE-2025-7409 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy