CVE-2025-7466

| EUVD-2025-21211 HIGH
2025-07-12 [email protected]
7.3
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low

Lifecycle Timeline

4
Analysis Generated
Mar 16, 2026 - 08:56 vuln.today
EUVD ID Assigned
Mar 16, 2026 - 08:56 euvd
EUVD-2025-21211
PoC Detected
Jul 15, 2025 - 18:08 vuln.today
Public exploit code
CVE Published
Jul 12, 2025 - 08:15 nvd
HIGH 7.3

DescriptionNVD

A vulnerability, which was classified as critical, has been found in 1000projects ABC Courier Management 1.0. Affected by this issue is some unknown functionality of the file /add_dealerrequest.php. The manipulation of the argument Name leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

AnalysisAI

A critical SQL injection vulnerability exists in 1000projects ABC Courier Management version 1.0 affecting the /add_dealerrequest.php endpoint, where the 'Name' parameter is not properly sanitized. An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary SQL queries, potentially leading to unauthorized data access, modification, or deletion. The vulnerability has been publicly disclosed with exploit code available, making it an active threat.

Technical ContextAI

The vulnerability is a classic SQL injection (CWE-74: Improper Neutralization of Special Elements used in an SQL Command) occurring in the /add_dealerrequest.php file of a PHP-based courier management application. The 'Name' parameter is directly concatenated into SQL queries without proper parameterized query preparation or input validation. PHP applications handling database operations through user-supplied input without using prepared statements or stored procedures with bound parameters are vulnerable to this attack class. The vulnerability root cause is improper input sanitization before SQL query construction, a well-known defect pattern in legacy PHP applications.

RemediationAI

Immediate actions required: (1) Upgrade to a patched version if available from the vendor—contact 1000projects immediately for security updates or version 1.0.1+ if released; (2) If no patch exists, implement emergency compensating controls: disable or restrict access to /add_dealerrequest.php via Web Application Firewall (WAF) rules, network segmentation, or IP whitelisting; (3) Implement input validation and sanitization using parameterized queries/prepared statements for all database operations; (4) Deploy Web Application Firewall (WAF) rules to detect and block SQL injection patterns in the 'Name' parameter; (5) Conduct forensic investigation to determine if the vulnerability has been exploited; (6) Review database access logs for suspicious query patterns. Long-term: patch management and code review to identify similar SQL injection vulnerabilities across the application.

Share

CVE-2025-7466 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy