CVE-2025-7539

| EUVD-2025-21269 HIGH
2025-07-13 [email protected]
7.3
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low

Lifecycle Timeline

4
Analysis Generated
Mar 16, 2026 - 09:18 vuln.today
EUVD ID Assigned
Mar 16, 2026 - 09:18 euvd
EUVD-2025-21269
PoC Detected
Jul 16, 2025 - 14:54 vuln.today
Public exploit code
CVE Published
Jul 13, 2025 - 20:15 nvd
HIGH 7.3

Description

A vulnerability, which was classified as critical, has been found in code-projects Online Appointment Booking System 1.0. This issue affects some unknown processing of the file /getdoctordaybooking.php. The manipulation of the argument cid leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

Analysis

CVE-2025-7539 is a critical SQL injection vulnerability in code-projects Online Appointment Booking System version 1.0, specifically in the /getdoctordaybooking.php file via the 'cid' parameter. The vulnerability allows unauthenticated remote attackers to execute arbitrary SQL queries, potentially leading to unauthorized data access, modification, or deletion of database records. Exploitation has been publicly disclosed with proof-of-concept availability, and the vulnerability may be actively exploited in the wild.

Technical Context

The vulnerability exists in the Online Appointment Booking System, a web-based PHP application typically deployed on Apache/Nginx servers with MySQL/MariaDB backends. The root cause is CWE-74 (Improper Neutralization of Special Elements in Output Used by a Downstream Component - 'Injection'), manifesting as SQL injection through inadequate input validation and sanitization. The /getdoctordaybooking.php endpoint fails to properly parameterize or escape the 'cid' (likely 'clinic_id' or similar) parameter before incorporating it into SQL queries. CPE identification: cpe:2.3:a:code-projects:online_appointment_booking_system:1.0:*:*:*:*:*:*:*. The affected component processes database queries without using prepared statements or parameterized queries, allowing attackers to break out of intended query context and inject malicious SQL syntax.

Affected Products

code-projects Online Appointment Booking System version 1.0 and potentially earlier versions not explicitly documented. The vulnerability affects all installations of this specific product version running on any web server/database combination (Linux/Windows with Apache/Nginx and MySQL/MariaDB). No evidence of vendor patches or version updates provided in available references; vendor responsiveness and patch availability status is unknown. Organizations using this product should immediately audit deployment inventory. No official vendor advisory URL is confirmed available.

Remediation

Immediate actions: (1) Disable or restrict network access to /getdoctordaybooking.php via WAF rules or firewall ACLs until patching is possible; (2) Implement input validation requiring 'cid' parameter to match expected numeric/alphanumeric pattern only, rejecting special SQL characters; (3) Update to a patched version if code-projects releases one (check project repository/vendor site); (4) If no patch available, implement parameterized queries using PHP prepared statements with mysqli or PDO; (5) Apply principle of least privilege to database user executing queries—restrict to SELECT-only permissions where possible; (6) Deploy SQL injection detection signatures in WAF/IDS; (7) Conduct immediate database audit for signs of compromise (examine query logs, check for unauthorized data access/modification). If patch availability is unclear, contact code-projects vendor directly for security advisory and timeline.

Priority Score

57
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +36
POC: +20

Share

CVE-2025-7539 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy