CVE-2025-7467

| EUVD-2025-21214 HIGH
2025-07-12 [email protected]
7.3
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low

Lifecycle Timeline

4
Analysis Generated
Mar 16, 2026 - 08:56 vuln.today
EUVD ID Assigned
Mar 16, 2026 - 08:56 euvd
EUVD-2025-21214
PoC Detected
Jul 15, 2025 - 15:44 vuln.today
Public exploit code
CVE Published
Jul 12, 2025 - 09:15 nvd
HIGH 7.3

Description

A vulnerability, which was classified as critical, was found in code-projects Modern Bag 1.0. This affects an unknown part of the file /product-detail.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

Analysis

CVE-2025-7467 is a critical SQL injection vulnerability in code-projects Modern Bag version 1.0 affecting the /product-detail.php file's ID parameter, allowing unauthenticated remote attackers to execute arbitrary SQL queries and potentially exfiltrate, modify, or delete database contents. The vulnerability has been publicly disclosed with exploit code available, and the CVSS 7.3 score reflects moderate-to-high real-world impact with low attack complexity and no authentication requirements.

Technical Context

This vulnerability exploits improper input validation in PHP-based e-commerce software (code-projects Modern Bag 1.0), classified under CWE-74 (Improper Neutralization of Special Elements in Output Used by a Downstream Component—'Injection'). The root cause is insufficient parameterization or sanitization of the ID query parameter in /product-detail.php before it is incorporated into SQL queries, allowing attackers to inject malicious SQL syntax. The affected software is an e-commerce shopping bag/cart management system written in PHP, typically deployed on LAMP stacks (Linux, Apache, MySQL, PHP). The vulnerability is a classic second-order or first-order SQL injection flaw where user-controlled input directly influences SQL construction without prepared statements or proper escaping.

Affected Products

Vendor: code-projects; Product: Modern Bag; Affected Version(s): 1.0 (explicitly confirmed as vulnerable); Component: /product-detail.php file, ID parameter. No CPE string was provided in the source data, but the affected CPE would logically be: cpe:2.3:a:code-projects:modern_bag:1.0:*:*:*:*:*:*:*. Scope: Any installation of Modern Bag 1.0 running on a web server with PHP and a backend SQL database (MySQL, MariaDB, PostgreSQL, or other). No patch version or fixed release version was indicated in the provided data.

Remediation

Immediate actions: (1) Apply the latest security patch from code-projects if available—check vendor website or security advisory page for Modern Bag > 1.0 release notes. (2) If no patch is available, implement input validation and parameterized queries: Replace all direct SQL concatenation in /product-detail.php with prepared statements (using mysqli prepared statements or PDO with bound parameters) for the ID parameter. (3) Short-term workaround: Implement a Web Application Firewall (WAF) rule to block SQL injection patterns in the ID parameter (e.g., detect quotes, UNION, OR 1=1, etc.). (4) Restrict database user privileges to read-only where possible. (5) Enable SQL query logging and monitor for suspicious patterns. (6) Consider disabling the /product-detail.php endpoint until patched if it is not business-critical. Upgrade to a patched version as soon as released by code-projects.

Priority Score

57
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +36
POC: +20

Share

CVE-2025-7467 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy