CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Lifecycle Timeline
4Tags
Description
A vulnerability has been found in code-projects Modern Bag 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/productadd_back.php. The manipulation of the argument namepro leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
Analysis
CVE-2025-7510 is a critical SQL injection vulnerability in code-projects Modern Bag 1.0 affecting the /admin/productadd_back.php file, where the 'namepro' parameter is improperly sanitized allowing remote unauthenticated attackers to execute arbitrary SQL queries. The vulnerability has been publicly disclosed with exploit code available, and carries a CVSS 7.3 score indicating moderate-to-high real-world risk with low attack complexity. An attacker can extract, modify, or delete database contents without authentication, compromising confidentiality, integrity, and availability of the application.
Technical Context
Modern Bag 1.0 is a web application (CPE likely: cpe:2.3:a:code-projects:modern_bag:1.0:*:*:*:*:*:*:*) written in PHP, commonly deployed on Apache/Nginx with MySQL or MariaDB backends. The vulnerability stems from CWE-74 (Improper Neutralization of Special Elements in Output Used by a Downstream Component - 'Injection'), a parent category encompassing SQL injection. The /admin/productadd_back.php endpoint accepts user-supplied input via the 'namepro' parameter and constructs SQL queries without parameterized statements or proper input validation, allowing attackers to inject malicious SQL syntax. This is a classic first-order SQL injection vulnerability in a PHP backend handler for product administration.
Affected Products
[{'product': 'Modern Bag', 'vendor': 'code-projects', 'affected_version': '1.0', 'cpe': 'cpe:2.3:a:code-projects:modern_bag:1.0:*:*:*:*:*:*:*', 'affected_component': '/admin/productadd_back.php', 'vulnerable_parameter': 'namepro', 'status': 'Unpatched (based on description; no vendor patch reference provided)'}]
Remediation
[{'type': 'Patching', 'description': 'Contact code-projects for security updates to Modern Bag >1.0. No official patch version is referenced in available data; vendor advisory should be requested immediately.', 'priority': 'CRITICAL'}, {'type': 'Code-Level Mitigation', 'description': 'If patching is delayed, modify /admin/productadd_back.php to use parameterized prepared statements (MySQLi prepared statements or PDO with bound parameters) for all SQL queries. Example: Use $mysqli->prepare() or PDO::prepare() instead of string concatenation.', 'code_example': "Unsafe: $query = 'INSERT INTO products (namepro) VALUES (' . $_POST['namepro'] . ')'; Correct: $stmt = $mysqli->prepare('INSERT INTO products (namepro) VALUES (?)'); $stmt->bind_param('s', $_POST['namepro']); $stmt->execute();"}, {'type': 'Input Validation', 'description': 'Implement strict input validation: whitelist allowed characters for product names, enforce maximum length limits, and use htmlspecialchars() for display contexts.', 'priority': 'HIGH'}, {'type': 'WAF/IDS Rule', 'description': "Deploy Web Application Firewall rules to detect SQL injection patterns in POST parameters to /admin/productadd_back.php (e.g., detection of quotes, UNION, SELECT, DROP keywords in 'namepro' parameter).", 'priority': 'MEDIUM'}, {'type': 'Access Control Hardening', 'description': 'Restrict access to /admin/ directory via IP whitelisting, VPN, or authentication bypass prevention until patch is applied.', 'priority': 'HIGH'}]
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-21240