CVE-2025-12338: SQL Injection in Campcodes Retro Basketball Shoes Online Store
A weakness has been identified in Campcodes Retro Basketball Shoes Online Store 1.0. This vulnerability affects unknown code of the file /admin/admin_product.ph. Executing manipulation of the argument pid can lead to sql injection. The attack may be launched remotely. The exploit has been made available to the public and could be exploited.
AI Analysis
Technical Summary
CVE-2025-12338 identifies a SQL injection vulnerability in Campcodes Retro Basketball Shoes Online Store version 1.0, located in the /admin/admin_product.ph file. The vulnerability arises from improper sanitization of the 'pid' parameter, which is used in SQL queries without adequate validation or parameterization. This allows remote attackers to inject malicious SQL code, potentially extracting, modifying, or deleting sensitive data from the backend database. The vulnerability requires no authentication or user interaction, making it easier to exploit remotely. Although the exact database system is unspecified, typical SQL injection impacts include unauthorized data disclosure, data integrity compromise, and possible denial of service through query manipulation. The vulnerability has a CVSS 4.0 score of 6.9, indicating medium severity with network attack vector, low complexity, no privileges or user interaction required, and limited impact on confidentiality, integrity, and availability. No official patches have been released yet, and no active exploitation in the wild has been reported, but a public exploit exists, increasing the urgency for mitigation. The vulnerability affects only version 1.0 of the product, which is an e-commerce platform focused on selling retro basketball shoes, likely used by small to medium-sized retailers.
Potential Impact
For European organizations using the Campcodes Retro Basketball Shoes Online Store 1.0, this vulnerability poses a significant risk to the confidentiality and integrity of customer and business data. Attackers exploiting the SQL injection could access sensitive information such as customer personal data, payment details, and inventory records, leading to data breaches and regulatory non-compliance under GDPR. Integrity of product and order data could be compromised, causing financial losses and reputational damage. Availability may also be affected if attackers execute destructive queries or cause database errors. The risk is heightened by the public availability of an exploit, which lowers the barrier for attackers. Retailers relying on this platform may face operational disruptions, loss of customer trust, and potential legal consequences. The impact is particularly critical for organizations handling large volumes of customer transactions or sensitive data. Additionally, the vulnerability could be leveraged as a foothold for further network intrusion or lateral movement within affected organizations.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately implement input validation and sanitization for the 'pid' parameter in the /admin/admin_product.ph file. Employing parameterized queries or prepared statements is essential to prevent SQL injection. Restrict access to the admin interface using network-level controls such as VPNs, IP whitelisting, or multi-factor authentication to reduce exposure. Monitor logs for suspicious SQL query patterns or unusual database activity indicative of exploitation attempts. If a patch from the vendor becomes available, apply it promptly. In the absence of an official patch, consider deploying Web Application Firewalls (WAFs) with rules targeting SQL injection patterns specific to the affected parameter. Conduct security audits and penetration testing focused on injection flaws. Educate development teams on secure coding practices to prevent similar vulnerabilities in future releases. Finally, ensure regular backups of databases to enable recovery in case of data corruption or loss.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain
CVE-2025-12338: SQL Injection in Campcodes Retro Basketball Shoes Online Store
Description
A weakness has been identified in Campcodes Retro Basketball Shoes Online Store 1.0. This vulnerability affects unknown code of the file /admin/admin_product.ph. Executing manipulation of the argument pid can lead to sql injection. The attack may be launched remotely. The exploit has been made available to the public and could be exploited.
AI-Powered Analysis
Technical Analysis
CVE-2025-12338 identifies a SQL injection vulnerability in Campcodes Retro Basketball Shoes Online Store version 1.0, located in the /admin/admin_product.ph file. The vulnerability arises from improper sanitization of the 'pid' parameter, which is used in SQL queries without adequate validation or parameterization. This allows remote attackers to inject malicious SQL code, potentially extracting, modifying, or deleting sensitive data from the backend database. The vulnerability requires no authentication or user interaction, making it easier to exploit remotely. Although the exact database system is unspecified, typical SQL injection impacts include unauthorized data disclosure, data integrity compromise, and possible denial of service through query manipulation. The vulnerability has a CVSS 4.0 score of 6.9, indicating medium severity with network attack vector, low complexity, no privileges or user interaction required, and limited impact on confidentiality, integrity, and availability. No official patches have been released yet, and no active exploitation in the wild has been reported, but a public exploit exists, increasing the urgency for mitigation. The vulnerability affects only version 1.0 of the product, which is an e-commerce platform focused on selling retro basketball shoes, likely used by small to medium-sized retailers.
Potential Impact
For European organizations using the Campcodes Retro Basketball Shoes Online Store 1.0, this vulnerability poses a significant risk to the confidentiality and integrity of customer and business data. Attackers exploiting the SQL injection could access sensitive information such as customer personal data, payment details, and inventory records, leading to data breaches and regulatory non-compliance under GDPR. Integrity of product and order data could be compromised, causing financial losses and reputational damage. Availability may also be affected if attackers execute destructive queries or cause database errors. The risk is heightened by the public availability of an exploit, which lowers the barrier for attackers. Retailers relying on this platform may face operational disruptions, loss of customer trust, and potential legal consequences. The impact is particularly critical for organizations handling large volumes of customer transactions or sensitive data. Additionally, the vulnerability could be leveraged as a foothold for further network intrusion or lateral movement within affected organizations.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately implement input validation and sanitization for the 'pid' parameter in the /admin/admin_product.ph file. Employing parameterized queries or prepared statements is essential to prevent SQL injection. Restrict access to the admin interface using network-level controls such as VPNs, IP whitelisting, or multi-factor authentication to reduce exposure. Monitor logs for suspicious SQL query patterns or unusual database activity indicative of exploitation attempts. If a patch from the vendor becomes available, apply it promptly. In the absence of an official patch, consider deploying Web Application Firewalls (WAFs) with rules targeting SQL injection patterns specific to the affected parameter. Conduct security audits and penetration testing focused on injection flaws. Educate development teams on secure coding practices to prevent similar vulnerabilities in future releases. Finally, ensure regular backups of databases to enable recovery in case of data corruption or loss.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-10-27T12:41:39.706Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 690013efba6dffc5e21f1184
Added to database: 10/28/2025, 12:53:03 AM
Last enriched: 10/28/2025, 1:08:10 AM
Last updated: 10/28/2025, 8:21:45 AM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-10151: CWE-667 Improper Locking in Softing Industrial Automation GmbH smartLink HW-PN
HighCVE-2025-10150: CWE-833: Deadlock in Softing Industrial Automation GmbH smartLink HW-PN
HighCVE-2025-12378: Unrestricted Upload in code-projects Simple Food Ordering System
MediumCVE-2025-11735: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in realmag777 HUSKY – Products Filter Professional for WooCommerce
HighCVE-2025-10145: CWE-918 Server-Side Request Forgery (SSRF) in themeisle Auto Featured Image (Auto Post Thumbnail)
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.