Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-28560: n/a

0
Medium
VulnerabilityCVE-2024-28560cvecve-2024-28560
Published: Fri Mar 22 2024 (03/22/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

SQL injection vulnerability in Niushop B2B2C v.5.3.3 and before allows an attacker to escalate privileges via the deleteArea() function of the Address.php component.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 10:22:33 UTC

Technical Analysis

CVE-2024-28560 is an SQL injection vulnerability identified in Niushop B2B2C version 5.3.3 and earlier. The vulnerability resides in the deleteArea() function of the Address.php component, which improperly sanitizes user input before incorporating it into SQL queries. This flaw allows an attacker with at least limited privileges (PR:L) to inject crafted SQL statements, potentially escalating their privileges within the application. The vulnerability is remotely exploitable over the network (AV:N) without requiring user interaction (UI:N). The CVSS 3.1 base score is 5.4, reflecting a medium severity due to the requirement for some privileges and the limited scope of impact. The primary impact is on confidentiality and integrity, as attackers may access or modify sensitive data or escalate privileges, but availability is not affected. No public exploits are currently known, and no official patches have been linked yet. The vulnerability is classified under CWE-89 (Improper Neutralization of Special Elements used in an SQL Command). Given the nature of Niushop as a B2B2C e-commerce platform, exploitation could lead to unauthorized access to customer or business data and manipulation of address-related records, potentially undermining trust and compliance.

Potential Impact

The vulnerability allows attackers with limited privileges to escalate their access rights, potentially gaining unauthorized control over sensitive data within the Niushop platform. This can lead to exposure or modification of customer addresses and related personal information, undermining confidentiality and data integrity. For organizations relying on Niushop B2B2C for e-commerce operations, this could result in data breaches, regulatory non-compliance (e.g., GDPR), reputational damage, and financial losses. Although availability is not directly impacted, the integrity compromise could disrupt business processes and customer trust. The requirement for some privileges reduces the risk from external unauthenticated attackers but does not eliminate the threat from insiders or compromised accounts. The absence of known exploits suggests limited current exploitation, but the vulnerability remains a significant risk if left unmitigated.

Mitigation Recommendations

Organizations should immediately review and restrict access privileges to the Niushop platform, ensuring that only trusted users have permissions to functions like deleteArea(). Input validation and parameterized queries should be implemented or verified in the Address.php component to prevent SQL injection. Until an official patch is released, consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block suspicious SQL injection patterns targeting the deleteArea() function. Conduct thorough code audits focusing on SQL query construction and sanitize all user inputs rigorously. Monitor logs for unusual database query patterns or privilege escalations. Additionally, enforce strong authentication and session management controls to limit the risk from compromised accounts. Organizations should subscribe to Niushop security advisories for timely patch releases and apply updates promptly once available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-03-08T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d92b7ef31ef0b588b9b

Added to database: 2/25/2026, 9:45:54 PM

Last enriched: 2/28/2026, 10:22:33 AM

Last updated: 4/12/2026, 5:13:58 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses