CVE-2025-6446

7.3 HIGH

📋 TL;DR

This critical SQL injection vulnerability in Client Details System 1.0 allows remote attackers to execute arbitrary SQL commands via the Username parameter in the admin interface. Attackers can potentially access, modify, or delete database content. All installations of Client Details System 1.0 with the vulnerable admin/index.php file are affected.

💻 Affected Systems

Products:
  • Client Details System
Versions: 1.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations with the vulnerable /clientdetails/admin/index.php file accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including data theft, data destruction, privilege escalation to admin, and potential server takeover via SQL injection to RCE chaining.

🟠

Likely Case

Unauthorized access to sensitive client data, administrative credentials theft, and database manipulation.

🟢

If Mitigated

Limited impact with proper input validation, parameterized queries, and database user privilege restrictions.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details are publicly available on GitHub and VulDB, making this easily exploitable.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://code-projects.org/

Restart Required: No

Instructions:

No official patch available. Consider migrating to alternative software or implementing workarounds.

🔧 Temporary Workarounds

Input Validation and Sanitization

all

Add server-side validation to sanitize Username parameter input before processing.

Modify /clientdetails/admin/index.php to validate and escape user input

Web Application Firewall (WAF)

all

Deploy WAF rules to block SQL injection patterns targeting the Username parameter.

Add WAF rule: Detect and block SQL injection in POST parameters

🧯 If You Can't Patch

  • Restrict access to /clientdetails/admin/ directory using IP whitelisting or authentication
  • Disable or remove the vulnerable admin/index.php file if not required

🔍 How to Verify

Check if Vulnerable:

Test the Username parameter in /clientdetails/admin/index.php with SQL injection payloads like ' OR '1'='1

Check Version:

Check software version in admin panel or configuration files

Verify Fix Applied:

Verify that SQL injection payloads no longer execute and return error messages

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL error messages in web server logs
  • Multiple failed login attempts with SQL payloads in Username field

Network Indicators:

  • HTTP POST requests to /clientdetails/admin/index.php containing SQL keywords in parameters

SIEM Query:

source="web_server" AND uri="/clientdetails/admin/index.php" AND (payload="' OR" OR payload="UNION" OR payload="SELECT")

🔗 References

📤 Share & Export