CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Lifecycle Timeline
4Description
A vulnerability classified as critical was found in code-projects Simple Car Rental System 1.0. This vulnerability affects unknown code of the file /admin/approve.php. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
Analysis
CVE-2025-7476 is a critical SQL injection vulnerability in code-projects Simple Car Rental System 1.0 affecting the /admin/approve.php endpoint's ID parameter. An unauthenticated remote attacker can exploit this to execute arbitrary SQL queries, potentially leading to unauthorized data access, modification, or deletion. The vulnerability has been publicly disclosed with exploit code available, elevating real-world risk despite the CVSS 7.3 score suggesting moderate impact.
Technical Context
The vulnerability exists in the Simple Car Rental System 1.0, a web-based vehicle rental management application. The root cause is classified under CWE-74 (Improper Neutralization of Special Elements in Output Used by a Downstream Component), which encompasses SQL injection flaws. Specifically, the /admin/approve.php file fails to properly sanitize or parameterize the 'ID' parameter before incorporating it into SQL queries. This is a classic first-order SQL injection vulnerability where user-supplied input is directly concatenated into SQL statements without escape sequences or prepared statement usage. The affected technology stack likely includes PHP as the backend language (evident from .php file extension) and a relational database (MySQL, PostgreSQL, or similar) commonly used in rental management systems.
Affected Products
code-projects Simple Car Rental System version 1.0 (CPE: cpe:2.3:a:code-projects:simple_car_rental_system:1.0:*:*:*:*:*:*:*). Specifically affected component: /admin/approve.php endpoint with 'ID' parameter. The vulnerability affects all installations of this version without vendor security patches applied. No vendor advisory URL was provided in available references; organizations using this open-source/community project should monitor code-projects GitHub repository or community forums for patch releases.
Remediation
Immediate remediation steps: (1) Apply any available security patches from code-projects (check GitHub repository for version 1.1 or later with SQL injection fixes); (2) If no patch is available, implement input validation by: parameterizing all SQL queries using prepared statements with bound parameters (mysqli_prepare or PDO prepared statements in PHP), implementing whitelist validation on the 'ID' parameter (numeric range check if it should be numeric), and applying strict type-casting (cast $ID to integer if appropriate); (3) Implement Web Application Firewall (WAF) rules to detect/block SQL injection payloads (e.g., common patterns: 'OR 1=1', UNION SELECT, stacked queries); (4) Restrict /admin/approve.php access via network segmentation or IP allowlisting to trusted admin networks; (5) Enable SQL error suppression in production to prevent information leakage, and log all database query errors for monitoring.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-21221