CVSS VectorNVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Lifecycle Timeline
4DescriptionNVD
A vulnerability was found in code-projects LifeStyle Store 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /success.php. The manipulation of the argument ID leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
AnalysisAI
CVE-2025-7411 is a critical SQL injection vulnerability in code-projects LifeStyle Store 1.0 affecting the /success.php endpoint's ID parameter, allowing unauthenticated remote attackers to execute arbitrary SQL queries and potentially read/modify sensitive data. Public exploit code is available and the vulnerability is likely actively exploited in the wild, making this a high-priority remediation target despite the moderate CVSS 7.3 score which reflects limited immediate system impact rather than true severity.
Technical ContextAI
This vulnerability represents a classic CWE-74 (Improper Neutralization of Special Elements in Output Used by a Downstream Component - 'Injection') SQL injection flaw in PHP-based e-commerce software. The /success.php file fails to properly sanitize or parameterize the 'ID' parameter before incorporation into SQL queries, likely during order confirmation or transaction processing workflows. The affected product LifeStyle Store 1.0 is a PHP/MySQL-based e-commerce application from code-projects. The vulnerability exploits insufficient input validation in server-side request handling, bypassing database query protection mechanisms.
RemediationAI
Immediate actions: (1) Apply input validation: implement parameterized prepared statements using mysqli_prepare() or PDO prepared statements to eliminate SQL injection, (2) Code fix example—replace direct concatenation in /success.php with prepared statements: $stmt = $conn->prepare('SELECT * FROM orders WHERE id = ?'); $stmt->bind_param('i', $_GET['ID']); $stmt->execute();, (3) Input sanitization: whitelist/validate ID parameter as integer-only using intval() or type casting, (4) Web Application Firewall (WAF) rule: deploy ModSecurity or similar to block SQL metacharacters in GET parameters, (5) No official patch identified—contact code-projects maintainers immediately or migrate to maintained fork if available. Workaround: Restrict /success.php access via authentication token validation until patched.
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-21046