CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Lifecycle Timeline
4Tags
Description
A vulnerability was found in code-projects Modern Bag 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/login-back.php. The manipulation of the argument user-name leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Analysis
CVE-2025-7471 is a critical SQL injection vulnerability in code-projects Modern Bag version 1.0 affecting the /admin/login-back.php endpoint. An unauthenticated remote attacker can inject malicious SQL code via the 'user-name' parameter to compromise confidentiality, integrity, and availability of the application and underlying database. The vulnerability has been publicly disclosed with proof-of-concept code available, increasing real-world exploitation risk.
Technical Context
This vulnerability stems from improper input validation and parameterization in the login authentication mechanism. The root cause is classified under CWE-74 (Improper Neutralization of Special Elements in Output), though the actual exploitation vector appears to be CWE-89 (SQL Injection). The vulnerable code path processes user-supplied input from the 'user-name' parameter directly into SQL queries without proper prepared statements or parameterized query execution. Modern Bag 1.0 is a PHP-based application (inferred from .php extension), and the vulnerability likely exists in the authentication handler before privilege checks occur. The attack surface is the publicly accessible admin login interface, which makes the unauthenticated attack vector feasible.
Affected Products
Modern Bag
Remediation
Immediate Mitigation: Restrict network access to /admin/login-back.php via firewall rules or WAF; limit admin interface exposure to known IP ranges only Application-Level Workaround: Implement input validation regex: reject user-name parameters containing SQL metacharacters (single quotes, double quotes, semicolons, dashes, asterisks). Deploy a WAF rule to block SQL keywords (SELECT, UNION, DROP, etc.) in the user-name field Code-Level Patch: Replace all SQL query concatenation in login-back.php with parameterized prepared statements using bound variables (mysqli prepared statements or PDO parameterized queries). Example: use prepared statement with ? placeholders instead of string interpolation Version Update: Check code-projects official repository/advisories for Modern Bag version >1.0 patch release. If unavailable, consider alternative admin authentication libraries Detection & Monitoring: Enable SQL error logging; monitor for unusual query patterns in database logs; set IDS/IPS signatures to detect SQL injection payloads (UNION, OR 1=1, stacked queries) in admin login POST requests
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-21218