Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13411: Unrestricted Upload in Campcodes Retro Basketball Shoes Online Store

0
Medium
VulnerabilityCVE-2025-13411cvecve-2025-13411
Published: Wed Nov 19 2025 (11/19/2025, 20:32:09 UTC)
Source: CVE Database V5
Vendor/Project: Campcodes
Product: Retro Basketball Shoes Online Store

Description

A vulnerability was found in Campcodes Retro Basketball Shoes Online Store 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/admin_football.php. Performing manipulation of the argument product_image results in unrestricted upload. The attack is possible to be carried out remotely. The exploit has been made public and could be used.

AI-Powered Analysis

AILast updated: 11/19/2025, 20:44:47 UTC

Technical Analysis

CVE-2025-13411 is a vulnerability identified in version 1.0 of the Campcodes Retro Basketball Shoes Online Store software. The flaw exists in the /admin/admin_football.php file, specifically in the handling of the product_image parameter. This parameter is vulnerable to unrestricted file upload, allowing an attacker with authenticated high-level privileges to upload arbitrary files to the server. The vulnerability is remotely exploitable and does not require user interaction, but it does require the attacker to have high privilege access, likely administrative credentials. Unrestricted file upload vulnerabilities are critical because they can lead to remote code execution, server takeover, or defacement if malicious files such as web shells are uploaded. Although no public exploits are currently reported in the wild, the existence of a public exploit means attackers could develop or use available code to exploit this flaw. The CVSS 4.0 vector indicates network attack vector, low complexity, no privileges required (though the summary states PR:H, meaning high privileges are needed), no user interaction, and low impact on confidentiality, integrity, and availability individually but combined could be significant. The lack of patch links suggests no official fix is yet available, increasing risk for affected users. The vulnerability is specific to version 1.0 of the product, so organizations running this version are vulnerable. This vulnerability is particularly concerning for e-commerce platforms that handle sensitive customer data and payment information, as exploitation could compromise both data and system integrity.

Potential Impact

For European organizations using Campcodes Retro Basketball Shoes Online Store 1.0, this vulnerability poses a risk of unauthorized file uploads leading to potential server compromise. Attackers with administrative access could upload malicious scripts or web shells, enabling further attacks such as data theft, defacement, or pivoting within the network. This could result in loss of customer trust, regulatory penalties under GDPR due to data breaches, and operational disruptions. The medium CVSS score reflects moderate impact, but the requirement for high privileges limits exploitation to insiders or attackers who have already compromised credentials. However, if administrative credentials are weak or stolen via phishing or other means, the vulnerability becomes a significant risk. The lack of a patch increases exposure time. European e-commerce businesses are particularly sensitive to reputational damage and legal consequences, making timely mitigation critical.

Mitigation Recommendations

1. Immediately restrict access to the /admin/admin_football.php endpoint to trusted IPs or VPNs to reduce exposure. 2. Enforce strong authentication mechanisms for admin accounts, including multi-factor authentication (MFA) to prevent credential compromise. 3. Implement strict file upload validation on the server side, allowing only specific image MIME types and verifying file contents to prevent malicious uploads. 4. Monitor server logs for unusual upload activity or access patterns to detect exploitation attempts early. 5. Isolate the upload directory with minimal permissions and disable execution rights to prevent uploaded files from being executed as code. 6. Regularly audit and rotate admin credentials to reduce risk from stolen credentials. 7. Engage with Campcodes for official patches or updates and apply them promptly once available. 8. Consider deploying web application firewalls (WAF) with rules to detect and block suspicious file uploads targeting this endpoint. 9. Conduct security awareness training for administrators to recognize phishing and credential theft attempts. 10. If possible, upgrade to a newer, patched version of the software or migrate to a more secure platform.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-19T14:34:03.204Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691e29f04d0ffcb40bb6a60b

Added to database: 11/19/2025, 8:34:56 PM

Last enriched: 11/19/2025, 8:44:47 PM

Last updated: 11/22/2025, 2:43:53 PM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats