Skip to main content

CVE-2025-11070: SQL Injection in Projectworlds Online Shopping System

Medium
VulnerabilityCVE-2025-11070cvecve-2025-11070
Published: Sat Sep 27 2025 (09/27/2025, 17:02:06 UTC)
Source: CVE Database V5
Vendor/Project: Projectworlds
Product: Online Shopping System

Description

A vulnerability was identified in Projectworlds Online Shopping System 1.0. This affects an unknown part of the file /store/cart_add.php. Such manipulation of the argument ID leads to sql injection. The attack may be performed from remote. The exploit is publicly available and might be used.

AI-Powered Analysis

AILast updated: 09/27/2025, 17:07:35 UTC

Technical Analysis

CVE-2025-11070 is a SQL Injection vulnerability identified in Projectworlds Online Shopping System version 1.0. The vulnerability exists in the /store/cart_add.php script, specifically related to the manipulation of the 'ID' parameter. An attacker can remotely exploit this flaw by injecting malicious SQL code through the 'ID' argument without requiring any authentication or user interaction. This injection can lead to unauthorized access or modification of the backend database, potentially exposing sensitive customer data, altering shopping cart contents, or even compromising the entire database server. The vulnerability has a CVSS 4.0 base score of 6.9, categorized as medium severity, reflecting its ease of exploitation (network accessible, no privileges or user interaction required) but limited impact on confidentiality, integrity, and availability (low to limited impact). Although no known exploits are currently observed in the wild, a public exploit is available, increasing the risk of exploitation. The lack of patches or vendor advisories at this time means organizations using this software remain exposed. The vulnerability highlights a common web application security flaw where insufficient input validation or parameterized queries allow attackers to manipulate backend SQL statements.

Potential Impact

For European organizations using Projectworlds Online Shopping System 1.0, this vulnerability poses a significant risk to the confidentiality and integrity of customer and transactional data. Exploitation could lead to data breaches involving personal identifiable information (PII), payment details, and order histories, potentially violating GDPR requirements and resulting in regulatory penalties. Additionally, attackers could manipulate shopping cart data, causing financial losses or reputational damage. The remote and unauthenticated nature of the exploit increases the threat level, as attackers can target vulnerable e-commerce platforms without prior access. Disruption of service or database corruption could also impact availability, leading to operational downtime and loss of customer trust. Given the critical role of e-commerce in European markets, such vulnerabilities can have cascading effects on business continuity and compliance.

Mitigation Recommendations

Organizations should immediately audit their use of Projectworlds Online Shopping System version 1.0 and prioritize upgrading to a patched or newer version once available. In the absence of official patches, implement web application firewall (WAF) rules to detect and block SQL injection patterns targeting the 'ID' parameter in /store/cart_add.php. Conduct thorough input validation and employ parameterized queries or prepared statements in the application code to prevent injection. Regularly monitor logs for suspicious activities related to cart operations. Additionally, perform security assessments and penetration testing focused on injection flaws. Isolate the affected system within the network to limit exposure and ensure database access controls follow the principle of least privilege. Finally, maintain up-to-date backups to enable recovery in case of data compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-26T12:10:03.621Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68d819c0f98d3a6506964431

Added to database: 9/27/2025, 5:07:12 PM

Last enriched: 9/27/2025, 5:07:35 PM

Last updated: 9/27/2025, 7:45:02 PM

Views: 5

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats