CVE-2025-12337: SQL Injection in Campcodes Retro Basketball Shoes Online Store
A security flaw has been discovered in Campcodes Retro Basketball Shoes Online Store 1.0. This affects an unknown part of the file /admin/admin_feature.php. Performing manipulation of the argument pid results in sql injection. The attack may be initiated remotely. The exploit has been released to the public and may be exploited.
AI Analysis
Technical Summary
CVE-2025-12337 identifies a SQL injection vulnerability in version 1.0 of the Campcodes Retro Basketball Shoes Online Store software. The vulnerability resides in the /admin/admin_feature.php file, specifically involving the 'pid' parameter. An attacker can remotely manipulate this parameter to inject malicious SQL code, potentially allowing unauthorized access to the backend database. The vulnerability requires no authentication or user interaction, making it highly accessible to attackers. The CVSS 4.0 score of 6.9 reflects a medium severity, considering the vulnerability's impact on confidentiality, integrity, and availability is limited but non-negligible, and the attack complexity is low. Although no active exploits have been observed in the wild, the public release of exploit code increases the likelihood of exploitation attempts. The vulnerability could allow attackers to extract sensitive customer data, modify product or order information, or disrupt the e-commerce platform's operations. The lack of patches or vendor advisories at this time necessitates immediate defensive measures by users of the affected software. This vulnerability exemplifies common web application security failures related to improper input validation and lack of parameterized queries in PHP-based e-commerce platforms.
Potential Impact
For European organizations using the Campcodes Retro Basketball Shoes Online Store 1.0, this vulnerability poses a significant risk to the confidentiality and integrity of customer and transactional data. Exploitation could lead to unauthorized disclosure of personal customer information, financial data, or internal business records. Data manipulation could result in fraudulent orders, inventory inaccuracies, or financial losses. Availability impacts may arise if attackers execute destructive SQL commands or cause database corruption, leading to downtime and loss of customer trust. Retailers relying on this platform may face regulatory consequences under GDPR if personal data is compromised. The remote, unauthenticated nature of the exploit increases the attack surface, making it easier for cybercriminals to target vulnerable installations across Europe. The public availability of exploit code further elevates the threat, potentially leading to widespread attacks if mitigations are not promptly applied.
Mitigation Recommendations
1. Immediately audit all instances of Campcodes Retro Basketball Shoes Online Store version 1.0 to identify vulnerable deployments. 2. Implement input validation and sanitization on the 'pid' parameter in /admin/admin_feature.php, ensuring only expected data types and values are accepted. 3. Refactor database queries to use parameterized statements or prepared queries to prevent SQL injection. 4. Restrict administrative interface access via network segmentation, VPNs, or IP whitelisting to reduce exposure. 5. Monitor web server and database logs for suspicious activity related to 'pid' parameter manipulation. 6. Develop and deploy patches or updates to the affected software version as soon as vendor releases them. 7. Conduct security training for developers to avoid similar injection flaws in future code. 8. Consider deploying Web Application Firewalls (WAF) with rules targeting SQL injection attempts as an interim protective measure. 9. Regularly back up databases and test restoration procedures to mitigate impact of potential data corruption or loss.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands
CVE-2025-12337: SQL Injection in Campcodes Retro Basketball Shoes Online Store
Description
A security flaw has been discovered in Campcodes Retro Basketball Shoes Online Store 1.0. This affects an unknown part of the file /admin/admin_feature.php. Performing manipulation of the argument pid results in sql injection. The attack may be initiated remotely. The exploit has been released to the public and may be exploited.
AI-Powered Analysis
Technical Analysis
CVE-2025-12337 identifies a SQL injection vulnerability in version 1.0 of the Campcodes Retro Basketball Shoes Online Store software. The vulnerability resides in the /admin/admin_feature.php file, specifically involving the 'pid' parameter. An attacker can remotely manipulate this parameter to inject malicious SQL code, potentially allowing unauthorized access to the backend database. The vulnerability requires no authentication or user interaction, making it highly accessible to attackers. The CVSS 4.0 score of 6.9 reflects a medium severity, considering the vulnerability's impact on confidentiality, integrity, and availability is limited but non-negligible, and the attack complexity is low. Although no active exploits have been observed in the wild, the public release of exploit code increases the likelihood of exploitation attempts. The vulnerability could allow attackers to extract sensitive customer data, modify product or order information, or disrupt the e-commerce platform's operations. The lack of patches or vendor advisories at this time necessitates immediate defensive measures by users of the affected software. This vulnerability exemplifies common web application security failures related to improper input validation and lack of parameterized queries in PHP-based e-commerce platforms.
Potential Impact
For European organizations using the Campcodes Retro Basketball Shoes Online Store 1.0, this vulnerability poses a significant risk to the confidentiality and integrity of customer and transactional data. Exploitation could lead to unauthorized disclosure of personal customer information, financial data, or internal business records. Data manipulation could result in fraudulent orders, inventory inaccuracies, or financial losses. Availability impacts may arise if attackers execute destructive SQL commands or cause database corruption, leading to downtime and loss of customer trust. Retailers relying on this platform may face regulatory consequences under GDPR if personal data is compromised. The remote, unauthenticated nature of the exploit increases the attack surface, making it easier for cybercriminals to target vulnerable installations across Europe. The public availability of exploit code further elevates the threat, potentially leading to widespread attacks if mitigations are not promptly applied.
Mitigation Recommendations
1. Immediately audit all instances of Campcodes Retro Basketball Shoes Online Store version 1.0 to identify vulnerable deployments. 2. Implement input validation and sanitization on the 'pid' parameter in /admin/admin_feature.php, ensuring only expected data types and values are accepted. 3. Refactor database queries to use parameterized statements or prepared queries to prevent SQL injection. 4. Restrict administrative interface access via network segmentation, VPNs, or IP whitelisting to reduce exposure. 5. Monitor web server and database logs for suspicious activity related to 'pid' parameter manipulation. 6. Develop and deploy patches or updates to the affected software version as soon as vendor releases them. 7. Conduct security training for developers to avoid similar injection flaws in future code. 8. Consider deploying Web Application Firewalls (WAF) with rules targeting SQL injection attempts as an interim protective measure. 9. Regularly back up databases and test restoration procedures to mitigate impact of potential data corruption or loss.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-10-27T12:41:36.831Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69000cd9ba6dffc5e21dd5bf
Added to database: 10/28/2025, 12:22:49 AM
Last enriched: 10/28/2025, 12:37:44 AM
Last updated: 10/28/2025, 6:21:54 AM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12378: Unrestricted Upload in code-projects Simple Food Ordering System
MediumCVE-2025-11735: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in realmag777 HUSKY – Products Filter Professional for WooCommerce
HighCVE-2025-10145: CWE-918 Server-Side Request Forgery (SSRF) in themeisle Auto Featured Image (Auto Post Thumbnail)
HighCVE-2025-62777: Use of hard-coded credentials in PLANEX COMMUNICATIONS INC. MZK-DP300N
HighCVE-2025-10939: Uncontrolled Search Path Element in Red Hat Red Hat Build of Keycloak
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.