CVE-2025-13410: SQL Injection in Campcodes Retro Basketball Shoes Online Store
A vulnerability has been found in Campcodes Retro Basketball Shoes Online Store 1.0. Affected is an unknown function of the file /admin/receipt.php. Such manipulation of the argument tid leads to sql injection. The attack can be executed remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-13410 identifies a SQL injection vulnerability in the Campcodes Retro Basketball Shoes Online Store version 1.0. The flaw exists in the /admin/receipt.php file where the tid parameter is improperly sanitized, allowing attackers to inject malicious SQL code remotely without requiring authentication or user interaction. This vulnerability enables attackers to manipulate backend SQL queries, potentially leading to unauthorized data access, modification, or deletion. The vulnerability affects the confidentiality, integrity, and availability of the database, although the impact is considered limited (VC:L/VI:L/VA:L). The CVSS 4.0 vector indicates no privileges or user interaction are needed, and the attack complexity is low, making exploitation feasible. While no known exploits have been observed in the wild yet, the public disclosure of the exploit increases the risk of imminent attacks. The absence of vendor patches necessitates immediate mitigation efforts by users of this software. The vulnerability is typical of improper input validation and lack of parameterized queries in web applications, emphasizing the need for secure coding practices in e-commerce platforms.
Potential Impact
The SQL injection vulnerability could allow attackers to access sensitive customer information, including personal and payment data, stored in the backend database. Attackers might also alter or delete transaction records, leading to financial discrepancies and loss of data integrity. Additionally, attackers could disrupt the availability of the online store by executing destructive SQL commands, causing downtime and loss of revenue. For organizations, this can result in reputational damage, regulatory penalties related to data protection laws, and increased operational costs due to incident response and remediation. Since the vulnerability requires no authentication and can be exploited remotely, the attack surface is broad, affecting any deployment of the vulnerable software accessible over the internet. The medium severity rating reflects the partial but significant impact on confidentiality, integrity, and availability, combined with ease of exploitation.
Mitigation Recommendations
Organizations should immediately audit the /admin/receipt.php file and sanitize the tid parameter to prevent SQL injection. Implementing prepared statements or parameterized queries is critical to eliminate injection vectors. If available, apply official patches or updates from Campcodes promptly. In the absence of vendor patches, consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block malicious SQL injection payloads targeting the tid parameter. Conduct thorough code reviews across the application to identify and remediate similar injection flaws. Regularly monitor logs for suspicious query patterns or repeated access attempts to /admin/receipt.php. Restrict administrative interface access via IP whitelisting or VPN to reduce exposure. Finally, ensure backups of critical data are current and tested to enable recovery in case of data corruption or loss.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, Japan, France, Netherlands, South Korea, Italy
CVE-2025-13410: SQL Injection in Campcodes Retro Basketball Shoes Online Store
Description
A vulnerability has been found in Campcodes Retro Basketball Shoes Online Store 1.0. Affected is an unknown function of the file /admin/receipt.php. Such manipulation of the argument tid leads to sql injection. The attack can be executed remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-13410 identifies a SQL injection vulnerability in the Campcodes Retro Basketball Shoes Online Store version 1.0. The flaw exists in the /admin/receipt.php file where the tid parameter is improperly sanitized, allowing attackers to inject malicious SQL code remotely without requiring authentication or user interaction. This vulnerability enables attackers to manipulate backend SQL queries, potentially leading to unauthorized data access, modification, or deletion. The vulnerability affects the confidentiality, integrity, and availability of the database, although the impact is considered limited (VC:L/VI:L/VA:L). The CVSS 4.0 vector indicates no privileges or user interaction are needed, and the attack complexity is low, making exploitation feasible. While no known exploits have been observed in the wild yet, the public disclosure of the exploit increases the risk of imminent attacks. The absence of vendor patches necessitates immediate mitigation efforts by users of this software. The vulnerability is typical of improper input validation and lack of parameterized queries in web applications, emphasizing the need for secure coding practices in e-commerce platforms.
Potential Impact
The SQL injection vulnerability could allow attackers to access sensitive customer information, including personal and payment data, stored in the backend database. Attackers might also alter or delete transaction records, leading to financial discrepancies and loss of data integrity. Additionally, attackers could disrupt the availability of the online store by executing destructive SQL commands, causing downtime and loss of revenue. For organizations, this can result in reputational damage, regulatory penalties related to data protection laws, and increased operational costs due to incident response and remediation. Since the vulnerability requires no authentication and can be exploited remotely, the attack surface is broad, affecting any deployment of the vulnerable software accessible over the internet. The medium severity rating reflects the partial but significant impact on confidentiality, integrity, and availability, combined with ease of exploitation.
Mitigation Recommendations
Organizations should immediately audit the /admin/receipt.php file and sanitize the tid parameter to prevent SQL injection. Implementing prepared statements or parameterized queries is critical to eliminate injection vectors. If available, apply official patches or updates from Campcodes promptly. In the absence of vendor patches, consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block malicious SQL injection payloads targeting the tid parameter. Conduct thorough code reviews across the application to identify and remediate similar injection flaws. Regularly monitor logs for suspicious query patterns or repeated access attempts to /admin/receipt.php. Restrict administrative interface access via IP whitelisting or VPN to reduce exposure. Finally, ensure backups of critical data are current and tested to enable recovery in case of data corruption or loss.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-19T14:33:54.909Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 691e29f04d0ffcb40bb6a604
Added to database: 11/19/2025, 8:34:56 PM
Last enriched: 2/24/2026, 10:06:15 PM
Last updated: 3/25/2026, 2:59:38 AM
Views: 88
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.