CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Lifecycle Timeline
4Description
A vulnerability, which was classified as critical, has been found in Campcodes Online Movie Theater Seat Reservation System 1.0. Affected by this issue is some unknown functionality of the file /reserve.php. The manipulation of the argument ID leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
Analysis
CVE-2025-7456 is a critical SQL injection vulnerability in Campcodes Online Movie Theater Seat Reservation System version 1.0, affecting the /reserve.php file's ID parameter. An unauthenticated remote attacker can exploit this to execute arbitrary SQL queries, potentially leading to unauthorized data access, modification, or deletion of the reservation database. Public exploit code is available, indicating active disclosure risk.
Technical Context
The vulnerability is a CWE-74 (Improper Neutralization of Special Elements in Output Used by a Downstream Component) manifestation, specifically SQL injection. The /reserve.php endpoint fails to properly sanitize or parameterize the ID parameter before incorporating it into SQL queries. This is a classic first-order SQL injection where user-supplied input reaches the SQL parser without adequate escaping or prepared statement usage. The affected product is a web-based reservation system written in PHP, indicating likely use of mysqli or PDO libraries without parameterized queries. CPE identifier would be: cpe:2.3:a:campcodes:online_movie_theater_seat_reservation_system:1.0:*:*:*:*:*:*:*
Affected Products
- vendor: Campcodes; product: Online Movie Theater Seat Reservation System; affected_version: 1.0; vulnerable_component: /reserve.php (ID parameter); cpe: cpe:2.3:a:campcodes:online_movie_theater_seat_reservation_system:1.0:*:*:*:*:*:*:*
Remediation
patch: Contact Campcodes for security patch or upgrade timeline input_validation: $id = (int)$_GET['id']; if($id <= 0) { reject request; } waf_mitigation: Block requests containing SQL keywords (UNION, SELECT, DROP, etc.) in the ID parameter access_control: Implement authentication checks before processing ID parameter
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-21183