CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Lifecycle Timeline
4Tags
Description
A vulnerability classified as critical was found in code-projects Mobile Shop 1.0. This vulnerability affects unknown code of the file /EditMobile.php. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
Analysis
CVE-2025-7459 is a SQL injection vulnerability in code-projects Mobile Shop version 1.0, specifically in the /EditMobile.php file's ID parameter, allowing unauthenticated remote attackers to execute arbitrary SQL queries. The vulnerability has been publicly disclosed with proof-of-concept code available, creating immediate risk for deployed instances. With a CVSS score of 7.3 and network-accessible attack vector, this poses significant risk to confidentiality, integrity, and availability of affected databases.
Technical Context
The vulnerability exists in the /EditMobile.php file of Mobile Shop 1.0, where user-supplied input via the ID parameter is improperly sanitized before being incorporated into SQL queries. This represents a classic CWE-74 (Improper Neutralization of Special Elements in Output Used by a Downstream Component - 'Injection') vulnerability. The root cause is likely insufficient input validation/parameterization of the ID parameter, allowing attackers to inject malicious SQL syntax. The affected component is a PHP-based mobile shopping application with direct database interaction in the edit functionality, suggesting inadequate use of prepared statements or parameterized queries.
Affected Products
Product: code-projects Mobile Shop; Affected Version: 1.0; Vulnerable Component: /EditMobile.php (ID parameter); Attack Vector: Remote, No Authentication Required. No specific CPE string was provided in the source data, but the affected product would likely map to CPE notation: cpe:2.3:a:code-projects:mobile_shop:1.0:*:*:*:*:*:*:*. No vendor advisory links were provided in the references data. Organizations running any deployment of Mobile Shop 1.0 are affected regardless of configuration.
Remediation
Immediate actions: (1) Apply a security patch from code-projects if available - verify the vendor's official advisory/patch repository for Mobile Shop 1.0.x hotfixes; (2) If no patch exists, implement input validation by enforcing strict parameterized/prepared SQL queries for all ID parameter handling in /EditMobile.php, ensuring the ID is cast to an integer type before SQL execution; (3) Temporary mitigation: restrict access to /EditMobile.php via WAF rules or network segmentation until patches are applied; (4) Implement database-level least-privilege principles to limit SQL injection damage scope. Long-term: upgrade to a newer version of Mobile Shop if available, or migrate to actively maintained alternatives. Conduct code review of all PHP files handling user input to identify similar injection vulnerabilities.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-21187