CVE-2025-7411

| EUVD-2025-21046 HIGH
2025-07-10 [email protected]
7.3
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low

Lifecycle Timeline

4
Analysis Generated
Mar 16, 2026 - 06:52 vuln.today
EUVD ID Assigned
Mar 16, 2026 - 06:52 euvd
EUVD-2025-21046
PoC Detected
Jul 16, 2025 - 15:02 vuln.today
Public exploit code
CVE Published
Jul 10, 2025 - 19:15 nvd
HIGH 7.3

DescriptionNVD

A vulnerability was found in code-projects LifeStyle Store 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /success.php. The manipulation of the argument ID leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

AnalysisAI

CVE-2025-7411 is a critical SQL injection vulnerability in code-projects LifeStyle Store 1.0 affecting the /success.php endpoint's ID parameter, allowing unauthenticated remote attackers to execute arbitrary SQL queries and potentially read/modify sensitive data. Public exploit code is available and the vulnerability is likely actively exploited in the wild, making this a high-priority remediation target despite the moderate CVSS 7.3 score which reflects limited immediate system impact rather than true severity.

Technical ContextAI

This vulnerability represents a classic CWE-74 (Improper Neutralization of Special Elements in Output Used by a Downstream Component - 'Injection') SQL injection flaw in PHP-based e-commerce software. The /success.php file fails to properly sanitize or parameterize the 'ID' parameter before incorporation into SQL queries, likely during order confirmation or transaction processing workflows. The affected product LifeStyle Store 1.0 is a PHP/MySQL-based e-commerce application from code-projects. The vulnerability exploits insufficient input validation in server-side request handling, bypassing database query protection mechanisms.

RemediationAI

Immediate actions: (1) Apply input validation: implement parameterized prepared statements using mysqli_prepare() or PDO prepared statements to eliminate SQL injection, (2) Code fix example—replace direct concatenation in /success.php with prepared statements: $stmt = $conn->prepare('SELECT * FROM orders WHERE id = ?'); $stmt->bind_param('i', $_GET['ID']); $stmt->execute();, (3) Input sanitization: whitelist/validate ID parameter as integer-only using intval() or type casting, (4) Web Application Firewall (WAF) rule: deploy ModSecurity or similar to block SQL metacharacters in GET parameters, (5) No official patch identified—contact code-projects maintainers immediately or migrate to maintained fork if available. Workaround: Restrict /success.php access via authentication token validation until patched.

Share

CVE-2025-7411 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy