CVE-2025-6500

7.3 HIGH

📋 TL;DR

This critical SQL injection vulnerability in code-projects Inventory Management System 1.0 allows remote attackers to execute arbitrary SQL commands via the editCategoriesName parameter in /php_action/editCategories.php. This can lead to database compromise, data theft, or system takeover. All installations of version 1.0 are affected.

💻 Affected Systems

Products:
  • code-projects Inventory Management System
Versions: 1.0
Operating Systems: All platforms running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of version 1.0 are vulnerable by default. No special configuration required.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, privilege escalation, and potential remote code execution on the underlying server.

🟠

Likely Case

Unauthorized database access allowing data extraction, modification, or deletion of inventory records and user data.

🟢

If Mitigated

Limited impact with proper input validation and database permissions, potentially only allowing data viewing.

🌐 Internet-Facing: HIGH - Remote exploitation without authentication makes internet-facing systems immediate targets.
🏢 Internal Only: MEDIUM - Internal systems still vulnerable but attack surface is reduced.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit available with simple SQL injection payloads. No authentication required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://code-projects.org/

Restart Required: No

Instructions:

No official patch available. Consider migrating to supported software or implementing workarounds.

🔧 Temporary Workarounds

Input Validation Filter

all

Add input validation to sanitize editCategoriesName parameter

Modify /php_action/editCategories.php to validate and sanitize user input before database queries

WAF Rule

all

Implement web application firewall rules to block SQL injection patterns

Add WAF rule to block requests containing SQL keywords in editCategoriesName parameter

🧯 If You Can't Patch

  • Remove or restrict access to /php_action/editCategories.php file
  • Implement strict network segmentation and limit database permissions

🔍 How to Verify

Check if Vulnerable:

Test by sending SQL injection payloads to editCategoriesName parameter and observing database errors or unexpected behavior

Check Version:

Check software version in admin panel or configuration files

Verify Fix Applied:

Test with same payloads and confirm proper error handling or rejection of malicious input

📡 Detection & Monitoring

Log Indicators:

  • SQL syntax errors in web server logs
  • Unusual database queries from web application
  • Multiple failed parameter manipulation attempts

Network Indicators:

  • HTTP POST requests to /php_action/editCategories.php with SQL keywords in parameters
  • Unusual database traffic patterns

SIEM Query:

source="web_logs" AND uri="/php_action/editCategories.php" AND (param="editCategoriesName" AND value CONTAINS "UNION" OR value CONTAINS "SELECT" OR value CONTAINS "--" OR value CONTAINS "' OR '")

🔗 References

📤 Share & Export