CVE-2025-13410: SQL Injection in Campcodes Retro Basketball Shoes Online Store
A vulnerability has been found in Campcodes Retro Basketball Shoes Online Store 1.0. Affected is an unknown function of the file /admin/receipt.php. Such manipulation of the argument tid leads to sql injection. The attack can be executed remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-13410 identifies a SQL injection vulnerability in version 1.0 of the Campcodes Retro Basketball Shoes Online Store, specifically within the /admin/receipt.php script. The vulnerability arises from improper sanitization of the 'tid' parameter, which is used in SQL queries without adequate validation or parameterization. This allows remote attackers to inject arbitrary SQL code by manipulating the 'tid' argument, potentially leading to unauthorized data access, data modification, or deletion. The attack vector is network-based with no authentication or user interaction required, making it highly accessible to attackers. The vulnerability affects confidentiality by exposing sensitive data, integrity by allowing unauthorized data changes, and availability if destructive queries are executed. The CVSS 4.0 vector indicates low complexity and no privileges needed, with partial impact on confidentiality, integrity, and availability. Although no public exploit code is currently known to be in the wild, the public disclosure of the vulnerability increases the risk of exploitation by threat actors. The lack of patches or official remediation guidance necessitates immediate defensive measures by affected organizations. This vulnerability is particularly critical for organizations running this specific e-commerce platform, as exploitation could compromise customer data and disrupt business operations.
Potential Impact
For European organizations using the Campcodes Retro Basketball Shoes Online Store 1.0, this vulnerability poses significant risks including unauthorized access to customer and transactional data, potential data manipulation, and disruption of e-commerce services. The SQL injection could lead to exposure of personally identifiable information (PII), payment details, and internal business data, which would have regulatory implications under GDPR. The integrity of sales records and receipts could be compromised, affecting financial reporting and trustworthiness. Availability could also be impacted if attackers execute destructive SQL commands, leading to downtime and loss of revenue. Small and medium-sized retailers using this platform are particularly vulnerable due to limited cybersecurity resources. The public disclosure increases the likelihood of exploitation attempts, potentially leading to targeted attacks against European e-commerce businesses. This could result in reputational damage, legal penalties, and financial losses.
Mitigation Recommendations
1. Immediate code review and remediation of the /admin/receipt.php file to ensure the 'tid' parameter is properly sanitized and validated. 2. Implement parameterized queries or prepared statements to prevent SQL injection. 3. Employ web application firewalls (WAFs) with rules specifically designed to detect and block SQL injection attempts targeting the 'tid' parameter. 4. Conduct thorough security testing, including automated and manual penetration testing, focusing on input validation in all admin-facing scripts. 5. Monitor logs for suspicious activities related to the 'tid' parameter or unusual database queries. 6. Restrict access to the /admin/ directory via IP whitelisting or VPN to reduce exposure. 7. Educate development teams on secure coding practices to prevent similar vulnerabilities. 8. If possible, upgrade to a patched or newer version of the software once available. 9. Regularly back up databases and ensure backups are stored securely to enable recovery in case of data corruption or deletion.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-13410: SQL Injection in Campcodes Retro Basketball Shoes Online Store
Description
A vulnerability has been found in Campcodes Retro Basketball Shoes Online Store 1.0. Affected is an unknown function of the file /admin/receipt.php. Such manipulation of the argument tid leads to sql injection. The attack can be executed remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-13410 identifies a SQL injection vulnerability in version 1.0 of the Campcodes Retro Basketball Shoes Online Store, specifically within the /admin/receipt.php script. The vulnerability arises from improper sanitization of the 'tid' parameter, which is used in SQL queries without adequate validation or parameterization. This allows remote attackers to inject arbitrary SQL code by manipulating the 'tid' argument, potentially leading to unauthorized data access, data modification, or deletion. The attack vector is network-based with no authentication or user interaction required, making it highly accessible to attackers. The vulnerability affects confidentiality by exposing sensitive data, integrity by allowing unauthorized data changes, and availability if destructive queries are executed. The CVSS 4.0 vector indicates low complexity and no privileges needed, with partial impact on confidentiality, integrity, and availability. Although no public exploit code is currently known to be in the wild, the public disclosure of the vulnerability increases the risk of exploitation by threat actors. The lack of patches or official remediation guidance necessitates immediate defensive measures by affected organizations. This vulnerability is particularly critical for organizations running this specific e-commerce platform, as exploitation could compromise customer data and disrupt business operations.
Potential Impact
For European organizations using the Campcodes Retro Basketball Shoes Online Store 1.0, this vulnerability poses significant risks including unauthorized access to customer and transactional data, potential data manipulation, and disruption of e-commerce services. The SQL injection could lead to exposure of personally identifiable information (PII), payment details, and internal business data, which would have regulatory implications under GDPR. The integrity of sales records and receipts could be compromised, affecting financial reporting and trustworthiness. Availability could also be impacted if attackers execute destructive SQL commands, leading to downtime and loss of revenue. Small and medium-sized retailers using this platform are particularly vulnerable due to limited cybersecurity resources. The public disclosure increases the likelihood of exploitation attempts, potentially leading to targeted attacks against European e-commerce businesses. This could result in reputational damage, legal penalties, and financial losses.
Mitigation Recommendations
1. Immediate code review and remediation of the /admin/receipt.php file to ensure the 'tid' parameter is properly sanitized and validated. 2. Implement parameterized queries or prepared statements to prevent SQL injection. 3. Employ web application firewalls (WAFs) with rules specifically designed to detect and block SQL injection attempts targeting the 'tid' parameter. 4. Conduct thorough security testing, including automated and manual penetration testing, focusing on input validation in all admin-facing scripts. 5. Monitor logs for suspicious activities related to the 'tid' parameter or unusual database queries. 6. Restrict access to the /admin/ directory via IP whitelisting or VPN to reduce exposure. 7. Educate development teams on secure coding practices to prevent similar vulnerabilities. 8. If possible, upgrade to a patched or newer version of the software once available. 9. Regularly back up databases and ensure backups are stored securely to enable recovery in case of data corruption or deletion.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-19T14:33:54.909Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 691e29f04d0ffcb40bb6a604
Added to database: 11/19/2025, 8:34:56 PM
Last enriched: 11/26/2025, 9:13:44 PM
Last updated: 1/7/2026, 5:23:46 AM
Views: 50
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0650: CWE-306 Missing Authentication for Critical Function in OpenFlagr Flagr
CriticalCVE-2025-15474: CWE-770 Allocation of Resources Without Limits or Throttling in AuntyFey AuntyFey Smart Combination Lock
MediumCVE-2025-14468: CWE-352 Cross-Site Request Forgery (CSRF) in mohammed_kaludi AMP for WP – Accelerated Mobile Pages
MediumCVE-2025-9611: CWE-749 Exposed Dangerous Method or Function in Microsoft Playwright
HighCVE-2026-22162
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.