Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12338: SQL Injection in Campcodes Retro Basketball Shoes Online Store

0
Medium
VulnerabilityCVE-2025-12338cvecve-2025-12338
Published: Tue Oct 28 2025 (10/28/2025, 00:32:06 UTC)
Source: CVE Database V5
Vendor/Project: Campcodes
Product: Retro Basketball Shoes Online Store

Description

A weakness has been identified in Campcodes Retro Basketball Shoes Online Store 1.0. This vulnerability affects unknown code of the file /admin/admin_product.ph. Executing manipulation of the argument pid can lead to sql injection. The attack may be launched remotely. The exploit has been made available to the public and could be exploited.

AI-Powered Analysis

AILast updated: 10/28/2025, 01:08:10 UTC

Technical Analysis

CVE-2025-12338 identifies a SQL injection vulnerability in Campcodes Retro Basketball Shoes Online Store version 1.0, located in the /admin/admin_product.ph file. The vulnerability arises from improper sanitization of the 'pid' parameter, which is used in SQL queries without adequate validation or parameterization. This allows remote attackers to inject malicious SQL code, potentially extracting, modifying, or deleting sensitive data from the backend database. The vulnerability requires no authentication or user interaction, making it easier to exploit remotely. Although the exact database system is unspecified, typical SQL injection impacts include unauthorized data disclosure, data integrity compromise, and possible denial of service through query manipulation. The vulnerability has a CVSS 4.0 score of 6.9, indicating medium severity with network attack vector, low complexity, no privileges or user interaction required, and limited impact on confidentiality, integrity, and availability. No official patches have been released yet, and no active exploitation in the wild has been reported, but a public exploit exists, increasing the urgency for mitigation. The vulnerability affects only version 1.0 of the product, which is an e-commerce platform focused on selling retro basketball shoes, likely used by small to medium-sized retailers.

Potential Impact

For European organizations using the Campcodes Retro Basketball Shoes Online Store 1.0, this vulnerability poses a significant risk to the confidentiality and integrity of customer and business data. Attackers exploiting the SQL injection could access sensitive information such as customer personal data, payment details, and inventory records, leading to data breaches and regulatory non-compliance under GDPR. Integrity of product and order data could be compromised, causing financial losses and reputational damage. Availability may also be affected if attackers execute destructive queries or cause database errors. The risk is heightened by the public availability of an exploit, which lowers the barrier for attackers. Retailers relying on this platform may face operational disruptions, loss of customer trust, and potential legal consequences. The impact is particularly critical for organizations handling large volumes of customer transactions or sensitive data. Additionally, the vulnerability could be leveraged as a foothold for further network intrusion or lateral movement within affected organizations.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately implement input validation and sanitization for the 'pid' parameter in the /admin/admin_product.ph file. Employing parameterized queries or prepared statements is essential to prevent SQL injection. Restrict access to the admin interface using network-level controls such as VPNs, IP whitelisting, or multi-factor authentication to reduce exposure. Monitor logs for suspicious SQL query patterns or unusual database activity indicative of exploitation attempts. If a patch from the vendor becomes available, apply it promptly. In the absence of an official patch, consider deploying Web Application Firewalls (WAFs) with rules targeting SQL injection patterns specific to the affected parameter. Conduct security audits and penetration testing focused on injection flaws. Educate development teams on secure coding practices to prevent similar vulnerabilities in future releases. Finally, ensure regular backups of databases to enable recovery in case of data corruption or loss.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-27T12:41:39.706Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 690013efba6dffc5e21f1184

Added to database: 10/28/2025, 12:53:03 AM

Last enriched: 10/28/2025, 1:08:10 AM

Last updated: 10/28/2025, 8:21:45 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats