CVE-2025-7457

| EUVD-2025-21188 HIGH
2025-07-11 [email protected]
7.3
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low

Lifecycle Timeline

4
Analysis Generated
Mar 16, 2026 - 08:18 vuln.today
EUVD ID Assigned
Mar 16, 2026 - 08:18 euvd
EUVD-2025-21188
PoC Detected
Jul 16, 2025 - 14:58 vuln.today
Public exploit code
CVE Published
Jul 11, 2025 - 21:15 nvd
HIGH 7.3

Description

A vulnerability, which was classified as critical, was found in Campcodes Online Movie Theater Seat Reservation System 1.0. This affects an unknown part of the file /admin/manage_movie.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

Analysis

CVE-2025-7457 is a critical SQL injection vulnerability in Campcodes Online Movie Theater Seat Reservation System version 1.0, affecting the /admin/manage_movie.php file's ID parameter. An unauthenticated remote attacker can exploit this to execute arbitrary SQL queries, potentially compromising database confidentiality, integrity, and availability. Public disclosure and exploit availability elevate the risk profile significantly.

Technical Context

The vulnerability is a classic SQL injection flaw (CWE-74: Improper Neutralization of Special Elements used in an SQL Command) in a PHP-based web application. The /admin/manage_movie.php endpoint fails to properly sanitize or parameterize the ID parameter before incorporating it into SQL queries. This allows attackers to inject malicious SQL syntax directly into the query logic. The affected product is a theater seat reservation system, typically handling sensitive reservation data, user credentials, and payment information. Without input validation or prepared statements, the application is vulnerable to UNION-based, Boolean-based, time-based, or error-based SQL injection attacks. The lack of authentication requirements on this admin function compounds the severity.

Affected Products

Campcodes Online Movie Theater Seat Reservation System version 1.0 is the confirmed affected product. The vulnerability exists in the /admin/manage_movie.php file. CPE string (inferred from description): cpe:2.3:a:campcodes:online_movie_theater_seat_reservation_system:1.0:*:*:*:*:*:*:*. All deployments of this specific version and all instances accessible via the /admin/manage_movie.php path are vulnerable. No patched versions have been identified in the public disclosure; the vendor (Campcodes) has not released a security advisory or patch as of the CVE publication date.

Remediation

Immediate actions: (1) If running Campcodes 1.0, apply an emergency patch or upgrade to a patched version (check vendor website or contact vendor support for patch availability; if none exists, consider alternative products); (2) Implement Web Application Firewall (WAF) rules to detect and block SQL injection patterns in the ID parameter (e.g., block single quotes, SQL keywords like UNION, SELECT in parameter values); (3) Restrict network access to /admin/manage_movie.php via IP whitelisting or require VPN access; (4) Implement mandatory authentication/authorization checks on all admin functions. Long-term remediation: (1) Require use of parameterized queries (prepared statements) for all database interactions; (2) Conduct a full code review of the application for similar SQL injection vulnerabilities in other admin endpoints; (3) Implement input validation and output encoding best practices per OWASP guidelines; (4) Consider migrating to a modern, actively-maintained reservation system with security-first architecture.

Priority Score

57
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +36
POC: +20

Share

CVE-2025-7457 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy