Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11628: SQL Injection in jimit105 Project-Online-Shopping-Website

0
Medium
VulnerabilityCVE-2025-11628cvecve-2025-11628
Published: Sun Oct 12 2025 (10/12/2025, 05:02:05 UTC)
Source: CVE Database V5
Vendor/Project: jimit105
Product: Project-Online-Shopping-Website

Description

A flaw has been found in jimit105 Project-Online-Shopping-Website up to 7d892f442bd8a96dd242dbe2b9bd5ed641e13e64. This affects an unknown function of the file /delete.php of the component Product Inventory Handler. This manipulation of the argument product_code causes sql injection. It is possible to initiate the attack remotely. The exploit has been published and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 10/19/2025, 05:48:55 UTC

Technical Analysis

CVE-2025-11628 identifies a SQL injection vulnerability in the Project-Online-Shopping-Website developed by jimit105, affecting the /delete.php script in the Product Inventory Handler component. The vulnerability is triggered by manipulation of the product_code parameter, which is not properly sanitized before being used in SQL queries. This allows an attacker with high privileges to remotely inject malicious SQL code, potentially leading to unauthorized data access, modification, or deletion. The vulnerability does not require user interaction but does require the attacker to have some level of privileges (PR:H), which suggests that exploitation is limited to authenticated users with elevated rights. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no user interaction (UI:N), and partial impacts on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). The vendor employs a rolling release model, complicating version tracking and patch management, and has not responded to vulnerability reports, leaving affected users without official remediation. Although no known exploits are currently observed in the wild, the public availability of exploit code increases the risk of future attacks. The vulnerability primarily threatens the integrity and confidentiality of the product inventory data and could disrupt e-commerce operations by unauthorized deletion or alteration of product records.

Potential Impact

For European organizations, especially those operating e-commerce platforms using the Project-Online-Shopping-Website software, this vulnerability poses a risk of unauthorized data manipulation, including deletion or alteration of product inventory information. This can lead to financial losses, reputational damage, and disruption of business operations. The partial compromise of confidentiality could expose sensitive product or customer data, potentially violating GDPR and other data protection regulations. The requirement for high privileges limits exploitation to insiders or compromised accounts, but the ease of remote exploitation without user interaction increases the threat surface. Organizations relying on this software without timely patching or mitigation may face targeted attacks aiming to disrupt sales or steal competitive information. The lack of vendor response and patch availability increases the urgency for organizations to implement compensating controls. Additionally, the rolling release model complicates vulnerability management and increases the risk of unnoticed exposure.

Mitigation Recommendations

1. Implement strict input validation and sanitization on all parameters, especially product_code in /delete.php, to prevent SQL injection. 2. Deploy a Web Application Firewall (WAF) with rules specifically targeting SQL injection patterns to detect and block malicious requests. 3. Restrict access to the /delete.php endpoint to only trusted, authenticated users with necessary privileges, and monitor access logs for suspicious activity. 4. Conduct regular code reviews and security testing focusing on injection vulnerabilities, particularly in legacy or rolling release software. 5. Employ database activity monitoring tools to detect anomalous queries indicative of injection attempts. 6. Isolate the database with least privilege principles, ensuring the web application user has minimal rights to reduce potential damage. 7. Since no official patch is available, consider temporary workarounds such as disabling the vulnerable functionality if feasible. 8. Maintain an incident response plan to quickly address any detected exploitation attempts. 9. Engage with the vendor or community to track updates or unofficial patches. 10. Educate developers and administrators on secure coding practices and the risks of SQL injection.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-11T13:42:24.183Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68eb38594d1b2b17802d79c0

Added to database: 10/12/2025, 5:10:49 AM

Last enriched: 10/19/2025, 5:48:55 AM

Last updated: 12/1/2025, 4:53:28 AM

Views: 84

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats