EUVD-2025-21244

| CVE-2025-7513 HIGH
2025-07-13 [email protected]
7.3
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low

Lifecycle Timeline

4
Analysis Generated
Mar 16, 2026 - 09:18 vuln.today
EUVD ID Assigned
Mar 16, 2026 - 09:18 euvd
EUVD-2025-21244
PoC Detected
Jul 15, 2025 - 17:41 vuln.today
Public exploit code
CVE Published
Jul 13, 2025 - 03:15 nvd
HIGH 7.3

Description

A vulnerability was found in code-projects Modern Bag 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/slideupdate.php. The manipulation of the argument idSlide leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

Analysis

CVE-2025-7513 is a critical SQL injection vulnerability in code-projects Modern Bag 1.0 affecting the /admin/slideupdate.php endpoint, where unsanitized idSlide parameter input allows unauthenticated remote attackers to execute arbitrary SQL queries. The vulnerability has been publicly disclosed with exploits available, enabling attackers to read, modify, or delete database records with moderate confidentiality, integrity, and availability impact.

Technical Context

This vulnerability exploits improper input validation in PHP application code, specifically CWE-74 (Improper Neutralization of Special Elements in Output Used by a Downstream Component), which encompasses SQL injection attacks. The affected file /admin/slideupdate.php processes user-supplied input (idSlide parameter) without parameterized queries or prepared statements, allowing SQL metacharacters to be injected directly into SQL command strings. The vulnerability affects code-projects Modern Bag 1.0, a PHP-based content management or e-commerce application. The lack of authentication requirement (PR:N in CVSS vector) means the SQL injection endpoint is accessible to unauthenticated users, significantly expanding the attack surface. The root cause stems from concatenating user input directly into SQL queries rather than using bound parameters or ORM protections.

Affected Products

[{'product': 'code-projects Modern Bag', 'vendor': 'code-projects', 'affected_versions': ['1.0'], 'component': '/admin/slideupdate.php', 'parameter': 'idSlide', 'cpe': 'cpe:2.3:a:code-projects:modern_bag:1.0:*:*:*:*:*:*:*'}]

Remediation

[{'type': 'patch', 'description': 'Upgrade to a patched version of Modern Bag beyond 1.0 (specific version not disclosed in provided data; contact vendor for availability)', 'action': 'Check code-projects official repository or advisory for patched release'}, {'type': 'code_fix', 'description': 'Implement parameterized queries/prepared statements in /admin/slideupdate.php for all database operations involving the idSlide parameter', 'action': "Replace direct SQL concatenation: FROM 'SELECT * FROM slides WHERE id=' . $_GET['idSlide'] WITH prepared statement: $stmt = $pdo->prepare('SELECT * FROM slides WHERE id = ?'); $stmt->execute([$_GET['idSlide']]);"}, {'type': 'mitigation', 'description': 'Restrict access to /admin/slideupdate.php via web server configuration (nginx/Apache) requiring authentication tokens or IP whitelisting until patch is available', 'action': 'Add authentication layer or deny access via .htaccess or nginx location block'}, {'type': 'mitigation', 'description': 'Implement input validation for idSlide parameter (integer type checking)', 'action': "Validate that idSlide is numeric: if (!is_numeric($_GET['idSlide'])) { die('Invalid input'); }"}, {'type': 'monitoring', 'description': 'Monitor web server logs for SQL injection patterns in idSlide parameter (e.g., UNION, SELECT, OR 1=1, etc.)', 'action': 'Configure WAF or IDS rules to detect and block SQL injection attempts'}]

Priority Score

57
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +36
POC: +20

Share

EUVD-2025-21244 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy