CVE-2025-13411: Unrestricted Upload in Campcodes Retro Basketball Shoes Online Store
CVE-2025-13411 is a medium severity vulnerability affecting Campcodes Retro Basketball Shoes Online Store version 1. 0. It involves an unrestricted file upload flaw in the /admin/admin_football. php endpoint via manipulation of the product_image parameter. The vulnerability can be exploited remotely without user interaction but requires high privileges (administrator-level access). Exploitation could allow attackers to upload malicious files, potentially leading to server compromise or data breaches. Although no public exploits are currently known in the wild, the exploit details have been disclosed. European organizations using this e-commerce platform are at risk, especially those with exposed or poorly secured admin interfaces. Mitigation requires restricting file upload types, implementing strict authentication and authorization controls, and monitoring admin endpoints. Countries with higher e-commerce adoption and known use of Campcodes products, such as Germany, France, and the UK, are more likely to be affected.
AI Analysis
Technical Summary
CVE-2025-13411 is a vulnerability identified in version 1.0 of the Campcodes Retro Basketball Shoes Online Store, specifically in the /admin/admin_football.php file. The flaw arises from an unrestricted file upload vulnerability via the product_image parameter, which allows an attacker with administrative privileges to upload arbitrary files to the server. The vulnerability is remotely exploitable and does not require user interaction, but it does require the attacker to have high-level privileges (PR:H). The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (AT:N) is contradicted by PR:H, so the attacker must be authenticated as an admin. The impact on confidentiality, integrity, and availability is low individually but combined could lead to significant compromise if malicious files are uploaded and executed. The vulnerability does not affect scope beyond the vulnerable component. Although no public exploits are currently observed in the wild, the exploit has been publicly disclosed, increasing the risk of exploitation. The lack of patch information suggests that organizations must implement compensating controls until an official fix is released.
Potential Impact
For European organizations, the unrestricted upload vulnerability poses risks including unauthorized code execution, server takeover, data leakage, and disruption of e-commerce operations. Attackers exploiting this flaw could upload web shells or malware, leading to full system compromise or lateral movement within the network. This could result in theft of customer data, financial fraud, or reputational damage. Given the e-commerce context, availability and integrity of the online store are critical, and disruption could lead to direct financial losses. Organizations with exposed or weakly protected admin interfaces are particularly vulnerable. The medium CVSS score reflects moderate risk, but the requirement for admin privileges limits the attack surface somewhat. However, insider threats or credential compromise could make exploitation feasible. The absence of known exploits in the wild currently reduces immediate risk but public disclosure increases the likelihood of future attacks.
Mitigation Recommendations
To mitigate CVE-2025-13411, organizations should immediately restrict file upload functionality by implementing strict validation on file types, sizes, and content to prevent malicious files from being accepted. Employ allowlists for permitted file extensions and use server-side scanning for malware. Enforce strong authentication and authorization controls on the /admin/admin_football.php endpoint, including multi-factor authentication for admin accounts. Regularly audit and monitor admin access logs for suspicious activity. Isolate the upload directory with appropriate permissions and disable execution rights on uploaded files to prevent code execution. Apply web application firewalls (WAF) rules to detect and block suspicious upload attempts. Until an official patch is released, consider temporarily disabling the vulnerable upload functionality if feasible. Conduct regular security assessments and penetration testing focused on file upload mechanisms. Educate administrators on credential security to reduce risk of privilege compromise.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands
CVE-2025-13411: Unrestricted Upload in Campcodes Retro Basketball Shoes Online Store
Description
CVE-2025-13411 is a medium severity vulnerability affecting Campcodes Retro Basketball Shoes Online Store version 1. 0. It involves an unrestricted file upload flaw in the /admin/admin_football. php endpoint via manipulation of the product_image parameter. The vulnerability can be exploited remotely without user interaction but requires high privileges (administrator-level access). Exploitation could allow attackers to upload malicious files, potentially leading to server compromise or data breaches. Although no public exploits are currently known in the wild, the exploit details have been disclosed. European organizations using this e-commerce platform are at risk, especially those with exposed or poorly secured admin interfaces. Mitigation requires restricting file upload types, implementing strict authentication and authorization controls, and monitoring admin endpoints. Countries with higher e-commerce adoption and known use of Campcodes products, such as Germany, France, and the UK, are more likely to be affected.
AI-Powered Analysis
Technical Analysis
CVE-2025-13411 is a vulnerability identified in version 1.0 of the Campcodes Retro Basketball Shoes Online Store, specifically in the /admin/admin_football.php file. The flaw arises from an unrestricted file upload vulnerability via the product_image parameter, which allows an attacker with administrative privileges to upload arbitrary files to the server. The vulnerability is remotely exploitable and does not require user interaction, but it does require the attacker to have high-level privileges (PR:H). The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (AT:N) is contradicted by PR:H, so the attacker must be authenticated as an admin. The impact on confidentiality, integrity, and availability is low individually but combined could lead to significant compromise if malicious files are uploaded and executed. The vulnerability does not affect scope beyond the vulnerable component. Although no public exploits are currently observed in the wild, the exploit has been publicly disclosed, increasing the risk of exploitation. The lack of patch information suggests that organizations must implement compensating controls until an official fix is released.
Potential Impact
For European organizations, the unrestricted upload vulnerability poses risks including unauthorized code execution, server takeover, data leakage, and disruption of e-commerce operations. Attackers exploiting this flaw could upload web shells or malware, leading to full system compromise or lateral movement within the network. This could result in theft of customer data, financial fraud, or reputational damage. Given the e-commerce context, availability and integrity of the online store are critical, and disruption could lead to direct financial losses. Organizations with exposed or weakly protected admin interfaces are particularly vulnerable. The medium CVSS score reflects moderate risk, but the requirement for admin privileges limits the attack surface somewhat. However, insider threats or credential compromise could make exploitation feasible. The absence of known exploits in the wild currently reduces immediate risk but public disclosure increases the likelihood of future attacks.
Mitigation Recommendations
To mitigate CVE-2025-13411, organizations should immediately restrict file upload functionality by implementing strict validation on file types, sizes, and content to prevent malicious files from being accepted. Employ allowlists for permitted file extensions and use server-side scanning for malware. Enforce strong authentication and authorization controls on the /admin/admin_football.php endpoint, including multi-factor authentication for admin accounts. Regularly audit and monitor admin access logs for suspicious activity. Isolate the upload directory with appropriate permissions and disable execution rights on uploaded files to prevent code execution. Apply web application firewalls (WAF) rules to detect and block suspicious upload attempts. Until an official patch is released, consider temporarily disabling the vulnerable upload functionality if feasible. Conduct regular security assessments and penetration testing focused on file upload mechanisms. Educate administrators on credential security to reduce risk of privilege compromise.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-19T14:34:03.204Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 691e29f04d0ffcb40bb6a60b
Added to database: 11/19/2025, 8:34:56 PM
Last enriched: 11/26/2025, 9:17:36 PM
Last updated: 1/7/2026, 4:20:55 AM
Views: 50
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-20893: Origin validation error in Fujitsu Client Computing Limited Fujitsu Security Solution AuthConductor Client Basic V2
HighCVE-2025-14891: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ivole Customer Reviews for WooCommerce
MediumCVE-2025-14059: CWE-73 External Control of File Name or Path in roxnor EmailKit – Email Customizer for WooCommerce & WP
MediumCVE-2025-12648: CWE-552 Files or Directories Accessible to External Parties in cbutlerjr WP-Members Membership Plugin
MediumCVE-2025-14631: CWE-476 NULL Pointer Dereference in TP-Link Systems Inc. Archer BE400
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.