EUVD-2025-21346

| CVE-2025-7607 HIGH
2025-07-14 [email protected]
7.3
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low

Lifecycle Timeline

4
Analysis Generated
Mar 16, 2026 - 09:43 vuln.today
EUVD ID Assigned
Mar 16, 2026 - 09:43 euvd
EUVD-2025-21346
PoC Detected
Oct 23, 2025 - 20:06 vuln.today
Public exploit code
CVE Published
Jul 14, 2025 - 14:15 nvd
HIGH 7.3

Description

A vulnerability, which was classified as critical, has been found in code-projects Simple Shopping Cart 1.0. This issue affects some unknown processing of the file /Customers/save_order.php. The manipulation of the argument order_price leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

Analysis

CVE-2025-7607 is a critical SQL injection vulnerability in code-projects Simple Shopping Cart 1.0 affecting the /Customers/save_order.php file, where the order_price parameter is improperly sanitized, allowing remote unauthenticated attackers to execute arbitrary SQL queries. The vulnerability has a public exploit disclosure and carries a CVSS score of 7.3 with demonstrated real-world exploitation potential, making it a high-priority security concern for affected deployments.

Technical Context

The vulnerability exists in Simple Shopping Cart 1.0 (CPE: cpe:2.3:a:code-projects:simple_shopping_cart:1.0:*:*:*:*:*:*:*) due to improper input validation in the order processing functionality. The root cause is classified under CWE-74 (Improper Neutralization of Special Elements in Output - 'Injection'), specifically SQL injection. The /Customers/save_order.php file fails to properly parameterize or sanitize the order_price parameter before incorporating it into SQL query construction, allowing attackers to inject arbitrary SQL commands. This is a classic procedural code vulnerability where user-supplied input is concatenated directly into SQL queries without prepared statements or input validation.

Affected Products

[{'product': 'Simple Shopping Cart', 'vendor': 'code-projects', 'affected_versions': ['1.0'], 'cpe': 'cpe:2.3:a:code-projects:simple_shopping_cart:1.0:*:*:*:*:*:*:*', 'affected_components': ['/Customers/save_order.php'], 'vulnerable_parameters': ['order_price']}]

Remediation

[{'type': 'patch', 'description': 'Upgrade to a patched version if available from code-projects. Check vendor advisory for Simple Shopping Cart security updates beyond version 1.0.', 'action': 'Contact code-projects for patch availability or monitor their repository for security releases'}, {'type': 'mitigation', 'description': 'Implement prepared statements/parameterized queries in /Customers/save_order.php to prevent SQL injection', 'action': 'Replace all SQL concatenation with prepared statements using bound parameters for order_price and all user inputs'}, {'type': 'mitigation', 'description': 'Implement input validation and sanitization for the order_price parameter', 'action': 'Validate that order_price is a valid numeric format before use; reject non-numeric input'}, {'type': 'mitigation', 'description': 'Implement Web Application Firewall (WAF) rules', 'action': 'Deploy WAF signatures to detect and block SQL injection patterns in the order_price parameter'}, {'type': 'mitigation', 'description': 'Principle of least privilege for database accounts', 'action': 'Ensure the database user running queries from save_order.php has minimal required permissions, limiting blast radius of SQL injection'}, {'type': 'monitoring', 'description': 'Enable SQL query logging and audit suspicious patterns', 'action': 'Monitor database logs for SQL syntax errors and unusual query patterns indicating injection attempts'}]

Priority Score

57
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +36
POC: +20

Share

EUVD-2025-21346 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy