CVSS VectorNVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Lifecycle Timeline
4DescriptionNVD
A vulnerability, which was classified as critical, has been found in 1000projects ABC Courier Management 1.0. Affected by this issue is some unknown functionality of the file /add_dealerrequest.php. The manipulation of the argument Name leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
AnalysisAI
A critical SQL injection vulnerability exists in 1000projects ABC Courier Management version 1.0 affecting the /add_dealerrequest.php endpoint, where the 'Name' parameter is not properly sanitized. An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary SQL queries, potentially leading to unauthorized data access, modification, or deletion. The vulnerability has been publicly disclosed with exploit code available, making it an active threat.
Technical ContextAI
The vulnerability is a classic SQL injection (CWE-74: Improper Neutralization of Special Elements used in an SQL Command) occurring in the /add_dealerrequest.php file of a PHP-based courier management application. The 'Name' parameter is directly concatenated into SQL queries without proper parameterized query preparation or input validation. PHP applications handling database operations through user-supplied input without using prepared statements or stored procedures with bound parameters are vulnerable to this attack class. The vulnerability root cause is improper input sanitization before SQL query construction, a well-known defect pattern in legacy PHP applications.
RemediationAI
Immediate actions required: (1) Upgrade to a patched version if available from the vendor—contact 1000projects immediately for security updates or version 1.0.1+ if released; (2) If no patch exists, implement emergency compensating controls: disable or restrict access to /add_dealerrequest.php via Web Application Firewall (WAF) rules, network segmentation, or IP whitelisting; (3) Implement input validation and sanitization using parameterized queries/prepared statements for all database operations; (4) Deploy Web Application Firewall (WAF) rules to detect and block SQL injection patterns in the 'Name' parameter; (5) Conduct forensic investigation to determine if the vulnerability has been exploited; (6) Review database access logs for suspicious query patterns. Long-term: patch management and code review to identify similar SQL injection vulnerabilities across the application.
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-21211