CVE-2025-11070: SQL Injection in Projectworlds Online Shopping System
A vulnerability was identified in Projectworlds Online Shopping System 1.0. This affects an unknown part of the file /store/cart_add.php. Such manipulation of the argument ID leads to sql injection. The attack may be performed from remote. The exploit is publicly available and might be used.
AI Analysis
Technical Summary
CVE-2025-11070 is a SQL Injection vulnerability identified in Projectworlds Online Shopping System version 1.0. The vulnerability exists in the /store/cart_add.php script, specifically related to the manipulation of the 'ID' parameter. An attacker can remotely exploit this flaw by injecting malicious SQL code through the 'ID' argument without requiring any authentication or user interaction. This injection can lead to unauthorized access or modification of the backend database, potentially exposing sensitive customer data, altering shopping cart contents, or even compromising the entire database server. The vulnerability has a CVSS 4.0 base score of 6.9, categorized as medium severity, reflecting its ease of exploitation (network accessible, no privileges or user interaction required) but limited impact on confidentiality, integrity, and availability (low to limited impact). Although no known exploits are currently observed in the wild, a public exploit is available, increasing the risk of exploitation. The lack of patches or vendor advisories at this time means organizations using this software remain exposed. The vulnerability highlights a common web application security flaw where insufficient input validation or parameterized queries allow attackers to manipulate backend SQL statements.
Potential Impact
For European organizations using Projectworlds Online Shopping System 1.0, this vulnerability poses a significant risk to the confidentiality and integrity of customer and transactional data. Exploitation could lead to data breaches involving personal identifiable information (PII), payment details, and order histories, potentially violating GDPR requirements and resulting in regulatory penalties. Additionally, attackers could manipulate shopping cart data, causing financial losses or reputational damage. The remote and unauthenticated nature of the exploit increases the threat level, as attackers can target vulnerable e-commerce platforms without prior access. Disruption of service or database corruption could also impact availability, leading to operational downtime and loss of customer trust. Given the critical role of e-commerce in European markets, such vulnerabilities can have cascading effects on business continuity and compliance.
Mitigation Recommendations
Organizations should immediately audit their use of Projectworlds Online Shopping System version 1.0 and prioritize upgrading to a patched or newer version once available. In the absence of official patches, implement web application firewall (WAF) rules to detect and block SQL injection patterns targeting the 'ID' parameter in /store/cart_add.php. Conduct thorough input validation and employ parameterized queries or prepared statements in the application code to prevent injection. Regularly monitor logs for suspicious activities related to cart operations. Additionally, perform security assessments and penetration testing focused on injection flaws. Isolate the affected system within the network to limit exposure and ensure database access controls follow the principle of least privilege. Finally, maintain up-to-date backups to enable recovery in case of data compromise.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium
CVE-2025-11070: SQL Injection in Projectworlds Online Shopping System
Description
A vulnerability was identified in Projectworlds Online Shopping System 1.0. This affects an unknown part of the file /store/cart_add.php. Such manipulation of the argument ID leads to sql injection. The attack may be performed from remote. The exploit is publicly available and might be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-11070 is a SQL Injection vulnerability identified in Projectworlds Online Shopping System version 1.0. The vulnerability exists in the /store/cart_add.php script, specifically related to the manipulation of the 'ID' parameter. An attacker can remotely exploit this flaw by injecting malicious SQL code through the 'ID' argument without requiring any authentication or user interaction. This injection can lead to unauthorized access or modification of the backend database, potentially exposing sensitive customer data, altering shopping cart contents, or even compromising the entire database server. The vulnerability has a CVSS 4.0 base score of 6.9, categorized as medium severity, reflecting its ease of exploitation (network accessible, no privileges or user interaction required) but limited impact on confidentiality, integrity, and availability (low to limited impact). Although no known exploits are currently observed in the wild, a public exploit is available, increasing the risk of exploitation. The lack of patches or vendor advisories at this time means organizations using this software remain exposed. The vulnerability highlights a common web application security flaw where insufficient input validation or parameterized queries allow attackers to manipulate backend SQL statements.
Potential Impact
For European organizations using Projectworlds Online Shopping System 1.0, this vulnerability poses a significant risk to the confidentiality and integrity of customer and transactional data. Exploitation could lead to data breaches involving personal identifiable information (PII), payment details, and order histories, potentially violating GDPR requirements and resulting in regulatory penalties. Additionally, attackers could manipulate shopping cart data, causing financial losses or reputational damage. The remote and unauthenticated nature of the exploit increases the threat level, as attackers can target vulnerable e-commerce platforms without prior access. Disruption of service or database corruption could also impact availability, leading to operational downtime and loss of customer trust. Given the critical role of e-commerce in European markets, such vulnerabilities can have cascading effects on business continuity and compliance.
Mitigation Recommendations
Organizations should immediately audit their use of Projectworlds Online Shopping System version 1.0 and prioritize upgrading to a patched or newer version once available. In the absence of official patches, implement web application firewall (WAF) rules to detect and block SQL injection patterns targeting the 'ID' parameter in /store/cart_add.php. Conduct thorough input validation and employ parameterized queries or prepared statements in the application code to prevent injection. Regularly monitor logs for suspicious activities related to cart operations. Additionally, perform security assessments and penetration testing focused on injection flaws. Isolate the affected system within the network to limit exposure and ensure database access controls follow the principle of least privilege. Finally, maintain up-to-date backups to enable recovery in case of data compromise.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-26T12:10:03.621Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68d819c0f98d3a6506964431
Added to database: 9/27/2025, 5:07:12 PM
Last enriched: 9/27/2025, 5:07:35 PM
Last updated: 9/27/2025, 7:45:02 PM
Views: 5
Related Threats
CVE-2025-11079: File and Directory Information Exposure in Campcodes Farm Management System
MediumCVE-2025-11078: Unrestricted Upload in itsourcecode Open Source Job Portal
MediumCVE-2025-11077: SQL Injection in Campcodes Online Learning Management System
MediumCVE-2025-11076: SQL Injection in Campcodes Online Learning Management System
MediumCVE-2025-11075: SQL Injection in Campcodes Online Learning Management System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.