EUVD-2025-28742

| CVE-2025-6501 HIGH
2025-06-23 [email protected]
7.3
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low

Lifecycle Timeline

4
Analysis Generated
Mar 15, 2026 - 22:10 vuln.today
EUVD ID Assigned
Mar 15, 2026 - 22:10 euvd
EUVD-2025-28742
PoC Detected
Jun 27, 2025 - 16:57 vuln.today
Public exploit code
CVE Published
Jun 23, 2025 - 03:15 nvd
HIGH 7.3

Description

A vulnerability, which was classified as critical, was found in code-projects Inventory Management System 1.0. This affects an unknown part of the file /php_action/createCategories.php. The manipulation of the argument categoriesStatus leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

Analysis

CVE-2025-6501 is a critical SQL injection vulnerability in code-projects Inventory Management System 1.0 affecting the /php_action/createCategories.php file, where the 'categoriesStatus' parameter is not properly sanitized. An unauthenticated remote attacker can exploit this to execute arbitrary SQL commands, potentially leading to unauthorized data access, modification, or deletion. Public exploit disclosure and proof-of-concept availability indicate active threat potential with low barrier to exploitation.

Technical Context

This vulnerability exists in a PHP-based web application (Inventory Management System) that processes user input from the 'categoriesStatus' parameter without adequate input validation or parameterized query protection. The root cause is classified under CWE-74 (Improper Neutralization of Special Elements in Output Used by a Downstream Component - 'Injection'), which is a parent category encompassing SQL injection (CWE-89). The vulnerable code path in /php_action/createCategories.php likely constructs SQL queries through string concatenation rather than using prepared statements or parameterized queries. The application stack involves PHP with an underlying database system (likely MySQL/MariaDB based on common IMS implementations), where unsanitized user input flows directly into dynamic SQL construction.

Affected Products

code-projects Inventory Management System version 1.0 and potentially earlier/later versions if code patterns are similar. CPE identification (estimated): cpe:2.3:a:code-projects:inventory_management_system:1.0:*:*:*:*:*:*:*. Vulnerable component: /php_action/createCategories.php. No vendor advisory URL, patch version, or workaround documentation is currently available in public sources, indicating either early disclosure or unmaintained software. Organizations running Inventory Management System 1.0 in any deployment context (on-premises, cloud, containerized) are affected if they expose the application to network access.

Remediation

Immediate steps: (1) ISOLATE - Restrict network access to /php_action/createCategories.php via WAF rules, IP whitelisting, or application firewall to trusted internal subnets only; (2) INPUT VALIDATION - Implement strict whitelist validation for 'categoriesStatus' parameter (e.g., accept only predefined enumerated values like 'active', 'inactive'); (3) PARAMETERIZED QUERIES - Rewrite the vulnerable query construction to use prepared statements with parameterized queries (PHP mysqli prepared statements or PDO prepared statements with bound parameters); (4) UPGRADE - Contact code-projects for security patches; if unavailable, consider migrating to maintained inventory management systems. Long-term: (1) Conduct a code audit of all PHP files handling user input, particularly in /php_action/ directory; (2) implement ORM frameworks (e.g., Doctrine, Eloquent) that abstract SQL construction; (3) deploy Web Application Firewall (WAF) rules for SQL injection pattern detection; (4) implement rate limiting and logging on createCategories.php endpoint; (5) run automated security scanning (SAST) in the CI/CD pipeline.

Priority Score

57
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +36
POC: +20

Share

EUVD-2025-28742 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy