CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Lifecycle Timeline
4Tags
Description
A vulnerability was found in code-projects Modern Bag 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/slideupdate.php. The manipulation of the argument idSlide leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Analysis
CVE-2025-7513 is a critical SQL injection vulnerability in code-projects Modern Bag 1.0 affecting the /admin/slideupdate.php endpoint, where unsanitized idSlide parameter input allows unauthenticated remote attackers to execute arbitrary SQL queries. The vulnerability has been publicly disclosed with exploits available, enabling attackers to read, modify, or delete database records with moderate confidentiality, integrity, and availability impact.
Technical Context
This vulnerability exploits improper input validation in PHP application code, specifically CWE-74 (Improper Neutralization of Special Elements in Output Used by a Downstream Component), which encompasses SQL injection attacks. The affected file /admin/slideupdate.php processes user-supplied input (idSlide parameter) without parameterized queries or prepared statements, allowing SQL metacharacters to be injected directly into SQL command strings. The vulnerability affects code-projects Modern Bag 1.0, a PHP-based content management or e-commerce application. The lack of authentication requirement (PR:N in CVSS vector) means the SQL injection endpoint is accessible to unauthenticated users, significantly expanding the attack surface. The root cause stems from concatenating user input directly into SQL queries rather than using bound parameters or ORM protections.
Affected Products
[{'product': 'code-projects Modern Bag', 'vendor': 'code-projects', 'affected_versions': ['1.0'], 'component': '/admin/slideupdate.php', 'parameter': 'idSlide', 'cpe': 'cpe:2.3:a:code-projects:modern_bag:1.0:*:*:*:*:*:*:*'}]
Remediation
[{'type': 'patch', 'description': 'Upgrade to a patched version of Modern Bag beyond 1.0 (specific version not disclosed in provided data; contact vendor for availability)', 'action': 'Check code-projects official repository or advisory for patched release'}, {'type': 'code_fix', 'description': 'Implement parameterized queries/prepared statements in /admin/slideupdate.php for all database operations involving the idSlide parameter', 'action': "Replace direct SQL concatenation: FROM 'SELECT * FROM slides WHERE id=' . $_GET['idSlide'] WITH prepared statement: $stmt = $pdo->prepare('SELECT * FROM slides WHERE id = ?'); $stmt->execute([$_GET['idSlide']]);"}, {'type': 'mitigation', 'description': 'Restrict access to /admin/slideupdate.php via web server configuration (nginx/Apache) requiring authentication tokens or IP whitelisting until patch is available', 'action': 'Add authentication layer or deny access via .htaccess or nginx location block'}, {'type': 'mitigation', 'description': 'Implement input validation for idSlide parameter (integer type checking)', 'action': "Validate that idSlide is numeric: if (!is_numeric($_GET['idSlide'])) { die('Invalid input'); }"}, {'type': 'monitoring', 'description': 'Monitor web server logs for SQL injection patterns in idSlide parameter (e.g., UNION, SELECT, OR 1=1, etc.)', 'action': 'Configure WAF or IDS rules to detect and block SQL injection attempts'}]
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-21244