CVE-2025-15409

MEDIUM6.9/ 10.0
Share:
Published: January 1, 2026 at 07:15 PM
Modified: January 6, 2026 at 06:15 PM
Source: cna@vuldb.com

Vulnerability Description

A vulnerability was determined in code-projects Online Guitar Store 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/Delete_product.php. Executing manipulation of the argument del_pro can lead to sql injection. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized.

CVSS Metrics

Base Score
6.9
Severity
MEDIUM
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Weaknesses (CWE)

Source: cna@vuldb.com
Source: nvd@nist.gov

AI Security Analysis

01 // Technical Summary

Online Guitar Store 1.0 suffers from a critical SQL injection vulnerability in /admin/Delete_product.php, allowing attackers to remotely execute arbitrary SQL commands. Successful exploitation grants attackers unauthorized access to the application's database, potentially leading to data breaches and complete system compromise. This vulnerability is publicly known and easily exploitable.

02 // Vulnerability Mechanism

Step 1: Reconnaissance: The attacker identifies the target application, Online Guitar Store 1.0, and confirms the existence of the /admin/Delete_product.php file.

Step 2: Payload Delivery: The attacker crafts a malicious SQL injection payload, targeting the del_pro parameter. This payload is designed to execute arbitrary SQL commands.

Step 3: Request Submission: The attacker sends a specially crafted HTTP request to /admin/Delete_product.php, including the malicious payload in the del_pro parameter.

Step 4: Server-Side Processing: The vulnerable PHP script receives the request and incorporates the attacker's input directly into an SQL query without proper sanitization.

Step 5: SQL Execution: The database server executes the injected SQL code, allowing the attacker to manipulate the database.

Step 6: Data Exfiltration/Manipulation: Based on the injected SQL, the attacker can then retrieve sensitive data (e.g., user credentials, product information), modify existing data, or potentially gain complete control over the database server.

03 // Deep Technical Analysis

The vulnerability stems from a lack of proper input validation and sanitization of the del_pro parameter within the /admin/Delete_product.php script. The script likely directly incorporates this user-supplied input into an SQL query without escaping special characters or validating the data type. This allows an attacker to inject malicious SQL code, such as adding, deleting, or modifying data within the database. The root cause is a failure to implement prepared statements or other secure coding practices to prevent SQL injection. The absence of any form of input validation or output encoding further exacerbates the risk.

CVE-2025-15409 - MEDIUM Severity (6.9) | Free CVE Database | 4nuxd