Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12919: Improper Control of Resource Identifiers in EverShop

0
Medium
VulnerabilityCVE-2025-12919cvecve-2025-12919
Published: Sun Nov 09 2025 (11/09/2025, 20:02:06 UTC)
Source: CVE Database V5
Product: EverShop

Description

A vulnerability was detected in EverShop up to 2.0.1. Affected is an unknown function of the file /src/modules/oms/graphql/types/Order/Order.resolvers.js of the component Order Handler. The manipulation of the argument uuid results in improper control of resource identifiers. The attack may be performed from remote. This attack is characterized by high complexity. The exploitability is told to be difficult. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 22:18:40 UTC

Technical Analysis

CVE-2025-12919 identifies a vulnerability in EverShop, an e-commerce platform, affecting versions 2.0.0 and 2.0.1. The issue resides in the Order Handler component, specifically within the GraphQL resolver file Order.resolvers.js. The vulnerability stems from improper control of resource identifiers, where the 'uuid' argument can be manipulated by an attacker. This manipulation can lead to unauthorized access or modification of order resources, potentially compromising order confidentiality and integrity. The attack vector is remote network access, requiring no authentication or user interaction, but the exploit complexity is high, making exploitation challenging. The CVSS 4.0 score is 6.3 (medium), reflecting the balance between potential impact and difficulty of exploitation. The vendor has not issued a patch or responded to disclosure, and while a public exploit exists, there are no reports of active exploitation in the wild. The lack of patch and vendor engagement increases risk for organizations using affected versions. The vulnerability could allow attackers to access or alter order information, impacting customer data privacy and transactional integrity within affected e-commerce deployments.

Potential Impact

The vulnerability can lead to unauthorized access or modification of order data within EverShop-based e-commerce platforms. This compromises confidentiality by exposing sensitive customer and order information and integrity by allowing unauthorized changes to orders. Availability impact is minimal as the vulnerability does not directly enable denial-of-service. The remote exploitability without authentication increases risk, especially in environments exposed to the internet. Organizations could face financial losses, reputational damage, and regulatory penalties if customer data is exposed or transactions are manipulated. The absence of vendor response and patches prolongs exposure, increasing the window for potential exploitation. Given the high complexity, widespread automated exploitation is less likely, but targeted attacks against high-value e-commerce sites remain a concern.

Mitigation Recommendations

Organizations should immediately audit their EverShop installations to identify affected versions (2.0.0 and 2.0.1). In the absence of official patches, consider the following mitigations: 1) Implement strict input validation and sanitization on the 'uuid' parameter at the GraphQL API gateway or web application firewall (WAF) level to block malformed or suspicious requests. 2) Restrict external access to the Order Handler GraphQL endpoint by IP whitelisting or network segmentation to limit exposure. 3) Monitor logs for unusual access patterns or attempts to manipulate UUID parameters. 4) Employ runtime application self-protection (RASP) tools to detect and block exploitation attempts dynamically. 5) Engage with the EverShop community or vendors for updates or unofficial patches. 6) Plan for an upgrade or patch deployment once the vendor releases a fix. 7) Conduct regular security assessments and penetration testing focused on GraphQL endpoints to identify similar weaknesses.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-09T06:29:03.722Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691102ed4abca22cf3180d07

Added to database: 11/9/2025, 9:09:01 PM

Last enriched: 2/24/2026, 10:18:40 PM

Last updated: 3/25/2026, 4:28:06 AM

Views: 129

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses