CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Lifecycle Timeline
4Description
A vulnerability classified as critical was found in Campcodes Online Movie Theater Seat Reservation System 1.0. Affected by this vulnerability is an unknown functionality of the file /manage_reserve.php. The manipulation of the argument mid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Analysis
CVE-2025-7455 is a critical SQL injection vulnerability in Campcodes Online Movie Theater Seat Reservation System version 1.0, specifically in the /manage_reserve.php file's 'mid' parameter. An unauthenticated remote attacker can exploit this to execute arbitrary SQL queries, potentially leading to unauthorized data access, modification, or service disruption. Public exploit disclosure and active exploitation potential significantly increase real-world risk despite the moderate CVSS 7.3 score.
Technical Context
This vulnerability exists in a PHP-based web application (Campcodes Online Movie Theater Seat Reservation System v1.0) that manages cinema seat reservations. The root cause is improper input validation/sanitization in the /manage_reserve.php script, classified under CWE-74 (Improper Neutralization of Special Elements in Output). The 'mid' parameter (likely a movie or showing ID) is passed directly into SQL queries without parameterized statements or prepared queries, allowing attackers to inject malicious SQL syntax. The attack vector is network-based with low attack complexity (AC:L), requiring no authentication (PR:N) or user interaction (UI:N), making this trivial to exploit at scale.
Affected Products
Campcodes Online Movie Theater Seat Reservation System version 1.0 (all installations). CPE string would be: cpe:2.3:a:campcodes:online_movie_theater_seat_reservation_system:1.0:*:*:*:*:*:*:*. No vendor advisory URL is provided in the CVE description; operators should contact Campcodes directly or check security mailing lists for patches. This appears to be a relatively obscure/niche application, suggesting patch availability and vendor responsiveness are unknown.
Remediation
Immediate actions: (1) Apply parameterized SQL queries/prepared statements with bound parameters in /manage_reserve.php to neutralize SQL injection—replace all concatenated SQL with parameterized variants (use mysqli prepared statements or PDO parameterized queries); (2) Implement strict input validation on the 'mid' parameter—whitelist acceptable values (numeric IDs only if applicable) and reject unexpected input; (3) Apply principle of least privilege to database credentials used by the application—restrict to SELECT/INSERT/UPDATE only where needed, not DROP/ALTER; (4) Enable Web Application Firewall (WAF) rules to block common SQL injection patterns in the interim. Long-term: Upgrade to a patched version once Campcodes releases one (version >1.0). Contact vendor for patch timeline. Consider code review of other parameters in /manage_reserve.php and adjacent functionality for similar vulnerabilities.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-21184