EUVD-2025-21245

| CVE-2025-7516 HIGH
2025-07-13 [email protected]
7.3
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low

Lifecycle Timeline

4
Analysis Generated
Mar 16, 2026 - 09:18 vuln.today
EUVD ID Assigned
Mar 16, 2026 - 09:18 euvd
EUVD-2025-21245
PoC Detected
Jul 15, 2025 - 18:34 vuln.today
Public exploit code
CVE Published
Jul 13, 2025 - 04:15 nvd
HIGH 7.3

Description

A vulnerability classified as critical was found in code-projects Online Appointment Booking System 1.0. This vulnerability affects unknown code of the file /cancelbookingpatient.php. The manipulation of the argument appointment leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

Analysis

CVE-2025-7516 is a critical SQL injection vulnerability in code-projects Online Appointment Booking System version 1.0, affecting the /cancelbookingpatient.php endpoint via the 'appointment' parameter. An unauthenticated remote attacker can exploit this to execute arbitrary SQL queries, potentially leading to unauthorized data access, modification, or deletion of appointment records and sensitive patient information. Public disclosure and proof-of-concept availability indicate active exploitation risk.

Technical Context

The vulnerability stems from improper input validation and parameterization in the appointment cancellation functionality. The /cancelbookingpatient.php file fails to sanitize or use prepared statements for the 'appointment' parameter before incorporating it into SQL queries, enabling classic SQL injection (CWE-74: Improper Neutralization of Special Elements used in an Output ('Injection')). This is a type of second-order or direct injection vulnerability in a PHP-based appointment management system. The affected product is code-projects Online Appointment Booking System 1.0, a web application for managing patient appointment scheduling. CPE likely: cpe:2.3:a:code-projects:online_appointment_booking_system:1.0:*:*:*:*:*:*:*

Affected Products

[{'vendor': 'code-projects', 'product': 'Online Appointment Booking System', 'version': '1.0', 'component': '/cancelbookingpatient.php', 'parameter': 'appointment', 'cpe': 'cpe:2.3:a:code-projects:online_appointment_booking_system:1.0:*:*:*:*:*:*:*', 'status': 'Vulnerable'}]

Remediation

[{'type': 'Patch', 'action': 'Upgrade to patched version (specific patched version not provided in available data; contact code-projects for availability)', 'priority': 'IMMEDIATE'}, {'type': 'Code-Level Fix', 'action': "Implement parameterized queries/prepared statements in /cancelbookingpatient.php for the 'appointment' parameter: Use mysqli_prepare() or PDO prepared statements instead of string concatenation in SQL queries", 'priority': 'IMMEDIATE'}, {'type': 'Input Validation', 'action': "Implement whitelist-based input validation for the 'appointment' parameter (e.g., numeric ID validation if appointment IDs are integers)", 'priority': 'IMMEDIATE'}, {'type': 'WAF Rule', 'action': 'Deploy Web Application Firewall rules to detect and block SQL injection patterns in /cancelbookingpatient.php requests', 'priority': 'INTERIM'}, {'type': 'Database Security', 'action': 'Apply principle of least privilege: restrict database user account permissions to only necessary operations (SELECT, UPDATE on appointment tables, not DROP/ALTER)', 'priority': 'HIGH'}, {'type': 'Monitoring', 'action': 'Enable database query logging and implement alerts for suspicious SQL patterns (UNION, comments, time-delays) on this endpoint', 'priority': 'HIGH'}]

Priority Score

57
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +36
POC: +20

Share

EUVD-2025-21245 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy