CVE-2025-7476

| EUVD-2025-21221 HIGH
2025-07-12 [email protected]
7.3
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low

Lifecycle Timeline

4
Analysis Generated
Mar 16, 2026 - 08:56 vuln.today
EUVD ID Assigned
Mar 16, 2026 - 08:56 euvd
EUVD-2025-21221
PoC Detected
Oct 23, 2025 - 20:06 vuln.today
Public exploit code
CVE Published
Jul 12, 2025 - 14:15 nvd
HIGH 7.3

Description

A vulnerability classified as critical was found in code-projects Simple Car Rental System 1.0. This vulnerability affects unknown code of the file /admin/approve.php. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

Analysis

CVE-2025-7476 is a critical SQL injection vulnerability in code-projects Simple Car Rental System 1.0 affecting the /admin/approve.php endpoint's ID parameter. An unauthenticated remote attacker can exploit this to execute arbitrary SQL queries, potentially leading to unauthorized data access, modification, or deletion. The vulnerability has been publicly disclosed with exploit code available, elevating real-world risk despite the CVSS 7.3 score suggesting moderate impact.

Technical Context

The vulnerability exists in the Simple Car Rental System 1.0, a web-based vehicle rental management application. The root cause is classified under CWE-74 (Improper Neutralization of Special Elements in Output Used by a Downstream Component), which encompasses SQL injection flaws. Specifically, the /admin/approve.php file fails to properly sanitize or parameterize the 'ID' parameter before incorporating it into SQL queries. This is a classic first-order SQL injection vulnerability where user-supplied input is directly concatenated into SQL statements without escape sequences or prepared statement usage. The affected technology stack likely includes PHP as the backend language (evident from .php file extension) and a relational database (MySQL, PostgreSQL, or similar) commonly used in rental management systems.

Affected Products

code-projects Simple Car Rental System version 1.0 (CPE: cpe:2.3:a:code-projects:simple_car_rental_system:1.0:*:*:*:*:*:*:*). Specifically affected component: /admin/approve.php endpoint with 'ID' parameter. The vulnerability affects all installations of this version without vendor security patches applied. No vendor advisory URL was provided in available references; organizations using this open-source/community project should monitor code-projects GitHub repository or community forums for patch releases.

Remediation

Immediate remediation steps: (1) Apply any available security patches from code-projects (check GitHub repository for version 1.1 or later with SQL injection fixes); (2) If no patch is available, implement input validation by: parameterizing all SQL queries using prepared statements with bound parameters (mysqli_prepare or PDO prepared statements in PHP), implementing whitelist validation on the 'ID' parameter (numeric range check if it should be numeric), and applying strict type-casting (cast $ID to integer if appropriate); (3) Implement Web Application Firewall (WAF) rules to detect/block SQL injection payloads (e.g., common patterns: 'OR 1=1', UNION SELECT, stacked queries); (4) Restrict /admin/approve.php access via network segmentation or IP allowlisting to trusted admin networks; (5) Enable SQL error suppression in production to prevent information leakage, and log all database query errors for monitoring.

Priority Score

57
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +36
POC: +20

Share

CVE-2025-7476 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy