CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Lifecycle Timeline
4Description
A vulnerability was found in code-projects Real Estate Property Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /Admin/EditCity.php. The manipulation leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Analysis
Critical SQL injection vulnerability in code-projects Real Estate Property Management System version 1.0, specifically in the /Admin/EditCity.php endpoint. An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary SQL commands, potentially leading to unauthorized data access, modification, or deletion. The exploit has been publicly disclosed with proof-of-concept code available, and the vulnerability is likely being actively exploited in the wild.
Technical Context
The vulnerability stems from improper input validation and parameterization in the EditCity.php administrative interface, classified under CWE-74 (Improper Neutralization of Special Elements in Output Used by a Downstream Component - 'Injection'). The root cause is the failure to properly sanitize or use prepared statements for user-supplied input before incorporating it into SQL queries. This is a classic SQL injection flaw where user-controlled parameters (likely city name, ID, or other form fields) are directly concatenated into dynamically constructed SQL statements without proper escaping or parameterized query mechanisms. The affected product is code-projects Real Estate Property Management System 1.0, a PHP-based web application handling property management operations.
Affected Products
code-projects Real Estate Property Management System version 1.0. CPE would be: cpe:2.3:a:code-projects:real_estate_property_management_system:1.0:*:*:*:*:*:*:*. This appears to be a lesser-known or self-hosted property management platform. No official vendor advisory URL was provided in available intelligence, suggesting either a third-party disclosure or disclosure to a non-responsive vendor.
Remediation
Immediate remediation actions: (1) Apply input validation and output encoding to all user-supplied parameters in EditCity.php, specifically implementing allowlist-based validation for city names and identifiers; (2) Refactor all SQL queries to use parameterized prepared statements (mysqli_prepare() or PDO prepared statements in PHP) instead of string concatenation; (3) Implement principle of least privilege for database user accounts—ensure the application database user has minimal necessary permissions; (4) Deploy Web Application Firewall (WAF) rules to block common SQL injection patterns (SQL keywords, comment syntax, union-based attacks) targeting the /Admin/ directory; (5) Apply strong authentication controls to administrative functions; (6) Contact code-projects for patch availability—if unavailable, consider forking/patching the codebase internally or migrating to a patched or alternative solution. Code review of other administrative endpoints (EditProperty.php, EditAgent.php, etc.) is strongly recommended given the pattern of vulnerability.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-17107