Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11513: SQL Injection in code-projects E-Commerce Website

0
Medium
VulnerabilityCVE-2025-11513cvecve-2025-11513
Published: Wed Oct 08 2025 (10/08/2025, 23:32:08 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: E-Commerce Website

Description

A vulnerability was determined in code-projects E-Commerce Website 1.0. This affects an unknown part of the file /pages/supplier_update.php. This manipulation of the argument supp_id causes sql injection. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized.

AI-Powered Analysis

AILast updated: 10/08/2025, 23:48:29 UTC

Technical Analysis

CVE-2025-11513 is a SQL Injection vulnerability identified in version 1.0 of the code-projects E-Commerce Website, specifically in the /pages/supplier_update.php file. The vulnerability arises from improper sanitization of the supp_id parameter, which is directly used in SQL queries, allowing an attacker to inject malicious SQL code. This injection can be performed remotely without requiring authentication or user interaction, making it highly accessible to attackers. The vulnerability can lead to unauthorized disclosure, modification, or deletion of database information, potentially compromising customer data, supplier details, or transactional records. The CVSS 4.0 base score of 6.9 reflects a medium severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact on confidentiality, integrity, and availability is low to medium, indicating partial compromise potential. Although no known exploits are currently active in the wild, the public disclosure increases the likelihood of exploitation attempts. The lack of available patches necessitates immediate mitigation through secure coding practices and monitoring. This vulnerability is critical for organizations relying on this e-commerce platform, as it could lead to data breaches and operational disruptions.

Potential Impact

For European organizations using the affected code-projects E-Commerce Website version 1.0, this vulnerability poses a significant risk to the confidentiality, integrity, and availability of sensitive business and customer data. Exploitation could allow attackers to extract supplier information, manipulate supplier records, or corrupt transactional data, leading to financial losses, reputational damage, and regulatory non-compliance, especially under GDPR. The remote and unauthenticated nature of the attack vector increases the threat surface, enabling attackers to exploit the vulnerability without insider access. Disruptions to supplier management processes could impact supply chain operations, affecting business continuity. Given the e-commerce sector's critical role in European economies, successful exploitation could also undermine customer trust and lead to legal liabilities. The medium severity score suggests that while the impact is serious, it may not result in full system compromise but still requires urgent attention.

Mitigation Recommendations

1. Immediately review and sanitize all inputs to the supp_id parameter in /pages/supplier_update.php to prevent SQL injection. 2. Implement parameterized queries or prepared statements to ensure that user input is not directly concatenated into SQL commands. 3. Conduct a thorough code audit of the entire application to identify and remediate similar injection vulnerabilities. 4. Monitor web application logs for unusual or suspicious SQL query patterns indicative of injection attempts. 5. Restrict database user permissions to the minimum necessary to limit the impact of potential exploitation. 6. Deploy Web Application Firewalls (WAF) with rules tuned to detect and block SQL injection payloads targeting this endpoint. 7. Once available, promptly apply official patches or updates from the vendor. 8. Educate development teams on secure coding practices to prevent recurrence. 9. Consider implementing runtime application self-protection (RASP) solutions to detect and block injection attacks in real-time. 10. Regularly back up databases and test restoration procedures to minimize downtime in case of data corruption.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-08T15:10:51.896Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68e6f7045269778ce9b0c3db

Added to database: 10/8/2025, 11:43:00 PM

Last enriched: 10/8/2025, 11:48:29 PM

Last updated: 10/9/2025, 1:35:45 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats