CVE-2025-7510

| EUVD-2025-21240 HIGH
2025-07-13 [email protected]
7.3
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low

Lifecycle Timeline

4
Analysis Generated
Mar 16, 2026 - 09:18 vuln.today
EUVD ID Assigned
Mar 16, 2026 - 09:18 euvd
EUVD-2025-21240
PoC Detected
Jul 15, 2025 - 17:44 vuln.today
Public exploit code
CVE Published
Jul 13, 2025 - 01:15 nvd
HIGH 7.3

Description

A vulnerability has been found in code-projects Modern Bag 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/productadd_back.php. The manipulation of the argument namepro leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

Analysis

CVE-2025-7510 is a critical SQL injection vulnerability in code-projects Modern Bag 1.0 affecting the /admin/productadd_back.php file, where the 'namepro' parameter is improperly sanitized allowing remote unauthenticated attackers to execute arbitrary SQL queries. The vulnerability has been publicly disclosed with exploit code available, and carries a CVSS 7.3 score indicating moderate-to-high real-world risk with low attack complexity. An attacker can extract, modify, or delete database contents without authentication, compromising confidentiality, integrity, and availability of the application.

Technical Context

Modern Bag 1.0 is a web application (CPE likely: cpe:2.3:a:code-projects:modern_bag:1.0:*:*:*:*:*:*:*) written in PHP, commonly deployed on Apache/Nginx with MySQL or MariaDB backends. The vulnerability stems from CWE-74 (Improper Neutralization of Special Elements in Output Used by a Downstream Component - 'Injection'), a parent category encompassing SQL injection. The /admin/productadd_back.php endpoint accepts user-supplied input via the 'namepro' parameter and constructs SQL queries without parameterized statements or proper input validation, allowing attackers to inject malicious SQL syntax. This is a classic first-order SQL injection vulnerability in a PHP backend handler for product administration.

Affected Products

[{'product': 'Modern Bag', 'vendor': 'code-projects', 'affected_version': '1.0', 'cpe': 'cpe:2.3:a:code-projects:modern_bag:1.0:*:*:*:*:*:*:*', 'affected_component': '/admin/productadd_back.php', 'vulnerable_parameter': 'namepro', 'status': 'Unpatched (based on description; no vendor patch reference provided)'}]

Remediation

[{'type': 'Patching', 'description': 'Contact code-projects for security updates to Modern Bag >1.0. No official patch version is referenced in available data; vendor advisory should be requested immediately.', 'priority': 'CRITICAL'}, {'type': 'Code-Level Mitigation', 'description': 'If patching is delayed, modify /admin/productadd_back.php to use parameterized prepared statements (MySQLi prepared statements or PDO with bound parameters) for all SQL queries. Example: Use $mysqli->prepare() or PDO::prepare() instead of string concatenation.', 'code_example': "Unsafe: $query = 'INSERT INTO products (namepro) VALUES (' . $_POST['namepro'] . ')'; Correct: $stmt = $mysqli->prepare('INSERT INTO products (namepro) VALUES (?)'); $stmt->bind_param('s', $_POST['namepro']); $stmt->execute();"}, {'type': 'Input Validation', 'description': 'Implement strict input validation: whitelist allowed characters for product names, enforce maximum length limits, and use htmlspecialchars() for display contexts.', 'priority': 'HIGH'}, {'type': 'WAF/IDS Rule', 'description': "Deploy Web Application Firewall rules to detect SQL injection patterns in POST parameters to /admin/productadd_back.php (e.g., detection of quotes, UNION, SELECT, DROP keywords in 'namepro' parameter).", 'priority': 'MEDIUM'}, {'type': 'Access Control Hardening', 'description': 'Restrict access to /admin/ directory via IP whitelisting, VPN, or authentication bypass prevention until patch is applied.', 'priority': 'HIGH'}]

Priority Score

57
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +36
POC: +20

Share

CVE-2025-7510 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy