CVE-2025-12339: SQL Injection in Campcodes Retro Basketball Shoes Online Store
A security vulnerability has been detected in Campcodes Retro Basketball Shoes Online Store 1.0. This issue affects some unknown processing of the file /admin/admin_football.php. The manipulation of the argument pid leads to sql injection. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used.
AI Analysis
Technical Summary
CVE-2025-12339 identifies a SQL injection vulnerability in the Campcodes Retro Basketball Shoes Online Store version 1.0, specifically within the /admin/admin_football.php script. The vulnerability arises from improper handling of the 'pid' parameter, which is susceptible to injection of malicious SQL commands. This flaw allows remote attackers to execute arbitrary SQL queries against the backend database without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:N). The impact on confidentiality, integrity, and availability is limited but present (VC:L/VI:L/VA:L), meaning attackers could potentially read, modify, or disrupt data to some extent. The vulnerability does not involve scope changes or privilege escalation but can be exploited remotely with low attack complexity. Although no public exploit code is currently known to be actively used in the wild, the public disclosure increases the risk of future exploitation. The lack of available patches or vendor advisories necessitates immediate attention from organizations using this software. The vulnerability is typical of SQL injection issues where user input is not properly sanitized or parameterized, allowing attackers to manipulate backend SQL queries to extract sensitive data, corrupt data, or cause denial of service conditions. Given the administrative context of the vulnerable script, successful exploitation could compromise critical backend functions related to product management or order processing.
Potential Impact
The SQL injection vulnerability in the Campcodes Retro Basketball Shoes Online Store can have significant impacts on affected organizations. Attackers exploiting this flaw can gain unauthorized access to sensitive customer data, including personal and payment information, leading to data breaches and privacy violations. The integrity of the database can be compromised, allowing attackers to alter product details, pricing, or order information, potentially disrupting business operations and damaging customer trust. Availability may also be affected if attackers execute queries that lock or crash the database, causing denial of service. Since the vulnerability is remotely exploitable without authentication, attackers can target the system from anywhere, increasing the attack surface. The public disclosure of the vulnerability raises the likelihood of exploitation attempts, especially by opportunistic attackers scanning for vulnerable e-commerce platforms. Organizations may face regulatory penalties, reputational damage, and financial losses if the vulnerability is exploited. The impact is particularly critical for businesses relying heavily on this platform for online sales and customer management.
Mitigation Recommendations
To mitigate CVE-2025-12339, organizations should immediately review and update the /admin/admin_football.php script to implement proper input validation and sanitization for the 'pid' parameter. The best practice is to use parameterized queries or prepared statements to prevent SQL injection attacks. If source code modification is not immediately feasible, deploying a Web Application Firewall (WAF) with rules to detect and block SQL injection patterns targeting the 'pid' parameter can provide temporary protection. Restricting access to the admin interface by IP whitelisting or VPN-only access reduces exposure to remote attackers. Regularly monitoring logs for suspicious SQL query patterns or repeated access attempts to the vulnerable endpoint can help detect exploitation attempts early. Organizations should also maintain up-to-date backups of their databases to enable recovery in case of data corruption or loss. Finally, contacting the vendor for official patches or updates and applying them promptly once available is critical for long-term remediation.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, Japan, France, Netherlands, Italy, Spain
CVE-2025-12339: SQL Injection in Campcodes Retro Basketball Shoes Online Store
Description
A security vulnerability has been detected in Campcodes Retro Basketball Shoes Online Store 1.0. This issue affects some unknown processing of the file /admin/admin_football.php. The manipulation of the argument pid leads to sql injection. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-12339 identifies a SQL injection vulnerability in the Campcodes Retro Basketball Shoes Online Store version 1.0, specifically within the /admin/admin_football.php script. The vulnerability arises from improper handling of the 'pid' parameter, which is susceptible to injection of malicious SQL commands. This flaw allows remote attackers to execute arbitrary SQL queries against the backend database without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:N). The impact on confidentiality, integrity, and availability is limited but present (VC:L/VI:L/VA:L), meaning attackers could potentially read, modify, or disrupt data to some extent. The vulnerability does not involve scope changes or privilege escalation but can be exploited remotely with low attack complexity. Although no public exploit code is currently known to be actively used in the wild, the public disclosure increases the risk of future exploitation. The lack of available patches or vendor advisories necessitates immediate attention from organizations using this software. The vulnerability is typical of SQL injection issues where user input is not properly sanitized or parameterized, allowing attackers to manipulate backend SQL queries to extract sensitive data, corrupt data, or cause denial of service conditions. Given the administrative context of the vulnerable script, successful exploitation could compromise critical backend functions related to product management or order processing.
Potential Impact
The SQL injection vulnerability in the Campcodes Retro Basketball Shoes Online Store can have significant impacts on affected organizations. Attackers exploiting this flaw can gain unauthorized access to sensitive customer data, including personal and payment information, leading to data breaches and privacy violations. The integrity of the database can be compromised, allowing attackers to alter product details, pricing, or order information, potentially disrupting business operations and damaging customer trust. Availability may also be affected if attackers execute queries that lock or crash the database, causing denial of service. Since the vulnerability is remotely exploitable without authentication, attackers can target the system from anywhere, increasing the attack surface. The public disclosure of the vulnerability raises the likelihood of exploitation attempts, especially by opportunistic attackers scanning for vulnerable e-commerce platforms. Organizations may face regulatory penalties, reputational damage, and financial losses if the vulnerability is exploited. The impact is particularly critical for businesses relying heavily on this platform for online sales and customer management.
Mitigation Recommendations
To mitigate CVE-2025-12339, organizations should immediately review and update the /admin/admin_football.php script to implement proper input validation and sanitization for the 'pid' parameter. The best practice is to use parameterized queries or prepared statements to prevent SQL injection attacks. If source code modification is not immediately feasible, deploying a Web Application Firewall (WAF) with rules to detect and block SQL injection patterns targeting the 'pid' parameter can provide temporary protection. Restricting access to the admin interface by IP whitelisting or VPN-only access reduces exposure to remote attackers. Regularly monitoring logs for suspicious SQL query patterns or repeated access attempts to the vulnerable endpoint can help detect exploitation attempts early. Organizations should also maintain up-to-date backups of their databases to enable recovery in case of data corruption or loss. Finally, contacting the vendor for official patches or updates and applying them promptly once available is critical for long-term remediation.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-10-27T12:41:42.781Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 690013efba6dffc5e21f118b
Added to database: 10/28/2025, 12:53:03 AM
Last enriched: 2/24/2026, 9:45:07 PM
Last updated: 3/22/2026, 7:53:50 AM
Views: 171
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.