First published: Tue Jan 07 2025(Updated: )
A vulnerability was found in code-projects Online Book Shop 1.0. It has been classified as critical. This affects an unknown part of the file /booklist.php. The manipulation of the argument subcatid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
code-projects Online Book Shop | ||
code-projects Online Book Shop | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-0296 has been classified as critical due to its potential for remote SQL injection.
To fix CVE-2025-0296, sanitize user input in the subcatid argument and implement prepared statements in the SQL queries.
CVE-2025-0296 affects the code-projects Online Book Shop version 1.0.
Yes, CVE-2025-0296 can be exploited remotely by manipulating the subcatid parameter.
CVE-2025-0296 allows attackers to execute arbitrary SQL queries, which could compromise the database security.