CVE-2025-13411: Unrestricted Upload in Campcodes Retro Basketball Shoes Online Store
A vulnerability was found in Campcodes Retro Basketball Shoes Online Store 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/admin_football.php. Performing manipulation of the argument product_image results in unrestricted upload. The attack is possible to be carried out remotely. The exploit has been made public and could be used.
AI Analysis
Technical Summary
CVE-2025-13411 is a vulnerability identified in version 1.0 of the Campcodes Retro Basketball Shoes Online Store software. The flaw exists in the /admin/admin_football.php file, specifically in the handling of the product_image parameter. This parameter is vulnerable to unrestricted file upload, allowing an attacker with authenticated high-level privileges to upload arbitrary files to the server. The vulnerability is remotely exploitable and does not require user interaction, but it does require the attacker to have high privilege access, likely administrative credentials. Unrestricted file upload vulnerabilities are critical because they can lead to remote code execution, server takeover, or defacement if malicious files such as web shells are uploaded. Although no public exploits are currently reported in the wild, the existence of a public exploit means attackers could develop or use available code to exploit this flaw. The CVSS 4.0 vector indicates network attack vector, low complexity, no privileges required (though the summary states PR:H, meaning high privileges are needed), no user interaction, and low impact on confidentiality, integrity, and availability individually but combined could be significant. The lack of patch links suggests no official fix is yet available, increasing risk for affected users. The vulnerability is specific to version 1.0 of the product, so organizations running this version are vulnerable. This vulnerability is particularly concerning for e-commerce platforms that handle sensitive customer data and payment information, as exploitation could compromise both data and system integrity.
Potential Impact
For European organizations using Campcodes Retro Basketball Shoes Online Store 1.0, this vulnerability poses a risk of unauthorized file uploads leading to potential server compromise. Attackers with administrative access could upload malicious scripts or web shells, enabling further attacks such as data theft, defacement, or pivoting within the network. This could result in loss of customer trust, regulatory penalties under GDPR due to data breaches, and operational disruptions. The medium CVSS score reflects moderate impact, but the requirement for high privileges limits exploitation to insiders or attackers who have already compromised credentials. However, if administrative credentials are weak or stolen via phishing or other means, the vulnerability becomes a significant risk. The lack of a patch increases exposure time. European e-commerce businesses are particularly sensitive to reputational damage and legal consequences, making timely mitigation critical.
Mitigation Recommendations
1. Immediately restrict access to the /admin/admin_football.php endpoint to trusted IPs or VPNs to reduce exposure. 2. Enforce strong authentication mechanisms for admin accounts, including multi-factor authentication (MFA) to prevent credential compromise. 3. Implement strict file upload validation on the server side, allowing only specific image MIME types and verifying file contents to prevent malicious uploads. 4. Monitor server logs for unusual upload activity or access patterns to detect exploitation attempts early. 5. Isolate the upload directory with minimal permissions and disable execution rights to prevent uploaded files from being executed as code. 6. Regularly audit and rotate admin credentials to reduce risk from stolen credentials. 7. Engage with Campcodes for official patches or updates and apply them promptly once available. 8. Consider deploying web application firewalls (WAF) with rules to detect and block suspicious file uploads targeting this endpoint. 9. Conduct security awareness training for administrators to recognize phishing and credential theft attempts. 10. If possible, upgrade to a newer, patched version of the software or migrate to a more secure platform.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands
CVE-2025-13411: Unrestricted Upload in Campcodes Retro Basketball Shoes Online Store
Description
A vulnerability was found in Campcodes Retro Basketball Shoes Online Store 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/admin_football.php. Performing manipulation of the argument product_image results in unrestricted upload. The attack is possible to be carried out remotely. The exploit has been made public and could be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-13411 is a vulnerability identified in version 1.0 of the Campcodes Retro Basketball Shoes Online Store software. The flaw exists in the /admin/admin_football.php file, specifically in the handling of the product_image parameter. This parameter is vulnerable to unrestricted file upload, allowing an attacker with authenticated high-level privileges to upload arbitrary files to the server. The vulnerability is remotely exploitable and does not require user interaction, but it does require the attacker to have high privilege access, likely administrative credentials. Unrestricted file upload vulnerabilities are critical because they can lead to remote code execution, server takeover, or defacement if malicious files such as web shells are uploaded. Although no public exploits are currently reported in the wild, the existence of a public exploit means attackers could develop or use available code to exploit this flaw. The CVSS 4.0 vector indicates network attack vector, low complexity, no privileges required (though the summary states PR:H, meaning high privileges are needed), no user interaction, and low impact on confidentiality, integrity, and availability individually but combined could be significant. The lack of patch links suggests no official fix is yet available, increasing risk for affected users. The vulnerability is specific to version 1.0 of the product, so organizations running this version are vulnerable. This vulnerability is particularly concerning for e-commerce platforms that handle sensitive customer data and payment information, as exploitation could compromise both data and system integrity.
Potential Impact
For European organizations using Campcodes Retro Basketball Shoes Online Store 1.0, this vulnerability poses a risk of unauthorized file uploads leading to potential server compromise. Attackers with administrative access could upload malicious scripts or web shells, enabling further attacks such as data theft, defacement, or pivoting within the network. This could result in loss of customer trust, regulatory penalties under GDPR due to data breaches, and operational disruptions. The medium CVSS score reflects moderate impact, but the requirement for high privileges limits exploitation to insiders or attackers who have already compromised credentials. However, if administrative credentials are weak or stolen via phishing or other means, the vulnerability becomes a significant risk. The lack of a patch increases exposure time. European e-commerce businesses are particularly sensitive to reputational damage and legal consequences, making timely mitigation critical.
Mitigation Recommendations
1. Immediately restrict access to the /admin/admin_football.php endpoint to trusted IPs or VPNs to reduce exposure. 2. Enforce strong authentication mechanisms for admin accounts, including multi-factor authentication (MFA) to prevent credential compromise. 3. Implement strict file upload validation on the server side, allowing only specific image MIME types and verifying file contents to prevent malicious uploads. 4. Monitor server logs for unusual upload activity or access patterns to detect exploitation attempts early. 5. Isolate the upload directory with minimal permissions and disable execution rights to prevent uploaded files from being executed as code. 6. Regularly audit and rotate admin credentials to reduce risk from stolen credentials. 7. Engage with Campcodes for official patches or updates and apply them promptly once available. 8. Consider deploying web application firewalls (WAF) with rules to detect and block suspicious file uploads targeting this endpoint. 9. Conduct security awareness training for administrators to recognize phishing and credential theft attempts. 10. If possible, upgrade to a newer, patched version of the software or migrate to a more secure platform.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-19T14:34:03.204Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 691e29f04d0ffcb40bb6a60b
Added to database: 11/19/2025, 8:34:56 PM
Last enriched: 11/19/2025, 8:44:47 PM
Last updated: 11/22/2025, 2:43:53 PM
Views: 19
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2024-0401: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in ASUS ExpertWiFi
HighCVE-2024-23690: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Netgear FVS336Gv3
HighCVE-2024-13976: CWE-427 Uncontrolled Search Path Element in Commvault Commvault for Windows
HighCVE-2024-12856: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Four-Faith F3x24
HighCVE-2025-13526: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in walterpinem OneClick Chat to Order
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.