Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13411: Unrestricted Upload in Campcodes Retro Basketball Shoes Online Store

0
Medium
VulnerabilityCVE-2025-13411cvecve-2025-13411
Published: Wed Nov 19 2025 (11/19/2025, 20:32:09 UTC)
Source: CVE Database V5
Vendor/Project: Campcodes
Product: Retro Basketball Shoes Online Store

Description

CVE-2025-13411 is a medium severity vulnerability affecting Campcodes Retro Basketball Shoes Online Store version 1. 0. It involves an unrestricted file upload flaw in the /admin/admin_football. php endpoint via manipulation of the product_image parameter. The vulnerability can be exploited remotely without user interaction but requires high privileges (administrator-level access). Exploitation could allow attackers to upload malicious files, potentially leading to server compromise or data breaches. Although no public exploits are currently known in the wild, the exploit details have been disclosed. European organizations using this e-commerce platform are at risk, especially those with exposed or poorly secured admin interfaces. Mitigation requires restricting file upload types, implementing strict authentication and authorization controls, and monitoring admin endpoints. Countries with higher e-commerce adoption and known use of Campcodes products, such as Germany, France, and the UK, are more likely to be affected.

AI-Powered Analysis

AILast updated: 11/26/2025, 21:17:36 UTC

Technical Analysis

CVE-2025-13411 is a vulnerability identified in version 1.0 of the Campcodes Retro Basketball Shoes Online Store, specifically in the /admin/admin_football.php file. The flaw arises from an unrestricted file upload vulnerability via the product_image parameter, which allows an attacker with administrative privileges to upload arbitrary files to the server. The vulnerability is remotely exploitable and does not require user interaction, but it does require the attacker to have high-level privileges (PR:H). The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (AT:N) is contradicted by PR:H, so the attacker must be authenticated as an admin. The impact on confidentiality, integrity, and availability is low individually but combined could lead to significant compromise if malicious files are uploaded and executed. The vulnerability does not affect scope beyond the vulnerable component. Although no public exploits are currently observed in the wild, the exploit has been publicly disclosed, increasing the risk of exploitation. The lack of patch information suggests that organizations must implement compensating controls until an official fix is released.

Potential Impact

For European organizations, the unrestricted upload vulnerability poses risks including unauthorized code execution, server takeover, data leakage, and disruption of e-commerce operations. Attackers exploiting this flaw could upload web shells or malware, leading to full system compromise or lateral movement within the network. This could result in theft of customer data, financial fraud, or reputational damage. Given the e-commerce context, availability and integrity of the online store are critical, and disruption could lead to direct financial losses. Organizations with exposed or weakly protected admin interfaces are particularly vulnerable. The medium CVSS score reflects moderate risk, but the requirement for admin privileges limits the attack surface somewhat. However, insider threats or credential compromise could make exploitation feasible. The absence of known exploits in the wild currently reduces immediate risk but public disclosure increases the likelihood of future attacks.

Mitigation Recommendations

To mitigate CVE-2025-13411, organizations should immediately restrict file upload functionality by implementing strict validation on file types, sizes, and content to prevent malicious files from being accepted. Employ allowlists for permitted file extensions and use server-side scanning for malware. Enforce strong authentication and authorization controls on the /admin/admin_football.php endpoint, including multi-factor authentication for admin accounts. Regularly audit and monitor admin access logs for suspicious activity. Isolate the upload directory with appropriate permissions and disable execution rights on uploaded files to prevent code execution. Apply web application firewalls (WAF) rules to detect and block suspicious upload attempts. Until an official patch is released, consider temporarily disabling the vulnerable upload functionality if feasible. Conduct regular security assessments and penetration testing focused on file upload mechanisms. Educate administrators on credential security to reduce risk of privilege compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-19T14:34:03.204Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691e29f04d0ffcb40bb6a60b

Added to database: 11/19/2025, 8:34:56 PM

Last enriched: 11/26/2025, 9:17:36 PM

Last updated: 1/7/2026, 4:20:55 AM

Views: 50

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats