Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12337: SQL Injection in Campcodes Retro Basketball Shoes Online Store

0
Medium
VulnerabilityCVE-2025-12337cvecve-2025-12337
Published: Tue Oct 28 2025 (10/28/2025, 00:02:09 UTC)
Source: CVE Database V5
Vendor/Project: Campcodes
Product: Retro Basketball Shoes Online Store

Description

A security flaw has been discovered in Campcodes Retro Basketball Shoes Online Store 1.0. This affects an unknown part of the file /admin/admin_feature.php. Performing manipulation of the argument pid results in sql injection. The attack may be initiated remotely. The exploit has been released to the public and may be exploited.

AI-Powered Analysis

AILast updated: 10/28/2025, 00:37:44 UTC

Technical Analysis

CVE-2025-12337 identifies a SQL injection vulnerability in version 1.0 of the Campcodes Retro Basketball Shoes Online Store software. The vulnerability resides in the /admin/admin_feature.php file, specifically involving the 'pid' parameter. An attacker can remotely manipulate this parameter to inject malicious SQL code, potentially allowing unauthorized access to the backend database. The vulnerability requires no authentication or user interaction, making it highly accessible to attackers. The CVSS 4.0 score of 6.9 reflects a medium severity, considering the vulnerability's impact on confidentiality, integrity, and availability is limited but non-negligible, and the attack complexity is low. Although no active exploits have been observed in the wild, the public release of exploit code increases the likelihood of exploitation attempts. The vulnerability could allow attackers to extract sensitive customer data, modify product or order information, or disrupt the e-commerce platform's operations. The lack of patches or vendor advisories at this time necessitates immediate defensive measures by users of the affected software. This vulnerability exemplifies common web application security failures related to improper input validation and lack of parameterized queries in PHP-based e-commerce platforms.

Potential Impact

For European organizations using the Campcodes Retro Basketball Shoes Online Store 1.0, this vulnerability poses a significant risk to the confidentiality and integrity of customer and transactional data. Exploitation could lead to unauthorized disclosure of personal customer information, financial data, or internal business records. Data manipulation could result in fraudulent orders, inventory inaccuracies, or financial losses. Availability impacts may arise if attackers execute destructive SQL commands or cause database corruption, leading to downtime and loss of customer trust. Retailers relying on this platform may face regulatory consequences under GDPR if personal data is compromised. The remote, unauthenticated nature of the exploit increases the attack surface, making it easier for cybercriminals to target vulnerable installations across Europe. The public availability of exploit code further elevates the threat, potentially leading to widespread attacks if mitigations are not promptly applied.

Mitigation Recommendations

1. Immediately audit all instances of Campcodes Retro Basketball Shoes Online Store version 1.0 to identify vulnerable deployments. 2. Implement input validation and sanitization on the 'pid' parameter in /admin/admin_feature.php, ensuring only expected data types and values are accepted. 3. Refactor database queries to use parameterized statements or prepared queries to prevent SQL injection. 4. Restrict administrative interface access via network segmentation, VPNs, or IP whitelisting to reduce exposure. 5. Monitor web server and database logs for suspicious activity related to 'pid' parameter manipulation. 6. Develop and deploy patches or updates to the affected software version as soon as vendor releases them. 7. Conduct security training for developers to avoid similar injection flaws in future code. 8. Consider deploying Web Application Firewalls (WAF) with rules targeting SQL injection attempts as an interim protective measure. 9. Regularly back up databases and test restoration procedures to mitigate impact of potential data corruption or loss.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-27T12:41:36.831Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69000cd9ba6dffc5e21dd5bf

Added to database: 10/28/2025, 12:22:49 AM

Last enriched: 10/28/2025, 12:37:44 AM

Last updated: 10/28/2025, 6:21:54 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats