CVE-2025-13412: Cross Site Scripting in Campcodes Retro Basketball Shoes Online Store
A vulnerability was determined in Campcodes Retro Basketball Shoes Online Store 1.0. Affected by this issue is some unknown functionality of the file /admin/admin_running.php. Executing a manipulation of the argument product_name can lead to cross site scripting. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized.
AI Analysis
Technical Summary
CVE-2025-13412 identifies a cross-site scripting (XSS) vulnerability in Campcodes Retro Basketball Shoes Online Store version 1.0. The vulnerability resides in the /admin/admin_running.php file, specifically in the handling of the product_name parameter. An attacker can remotely manipulate this parameter to inject malicious scripts, which are then executed in the context of an administrator's browser session. This can lead to unauthorized actions such as session hijacking, defacement, or theft of sensitive information. The attack vector requires no authentication but does require user interaction, typically the administrator visiting a crafted URL or interface. The CVSS 4.8 score reflects the moderate impact and ease of exploitation, with no privileges required but user interaction necessary. No patches or official fixes have been released, and no known exploits are currently active in the wild. The vulnerability is significant because it affects the administrative interface, which typically has elevated privileges and access to sensitive data and functions. Without proper input validation and output encoding, the product_name parameter can be exploited to execute arbitrary JavaScript code, compromising the integrity and confidentiality of the system. Organizations using this software should implement immediate mitigations such as restricting admin panel access, deploying web application firewalls (WAFs) with XSS filtering, and conducting thorough input sanitization. Monitoring for suspicious activity and preparing for patch deployment once available is critical to reduce risk.
Potential Impact
The primary impact of CVE-2025-13412 is the compromise of administrative sessions through cross-site scripting, potentially allowing attackers to hijack sessions, perform unauthorized administrative actions, or steal sensitive data. This can lead to data integrity issues, unauthorized changes to product listings or pricing, and exposure of confidential business information. Since the vulnerability affects the admin interface, the scope of damage can be significant if exploited. The requirement for user interaction limits automated exploitation but does not eliminate risk, especially in targeted attacks or phishing campaigns. Organizations relying on this software for e-commerce operations may face operational disruptions, reputational damage, and financial losses. The absence of an official patch increases exposure time, and attackers could develop exploits once the vulnerability details are widely known. The vulnerability could also be leveraged as a foothold for further attacks within the network, including privilege escalation or lateral movement. Overall, the threat poses a moderate risk but with potentially severe consequences if exploited in high-value environments.
Mitigation Recommendations
1. Restrict access to the /admin/admin_running.php interface by IP whitelisting or VPN-only access to reduce exposure. 2. Implement strict input validation and output encoding on the product_name parameter to neutralize malicious scripts. 3. Deploy a web application firewall (WAF) with rules specifically targeting XSS payloads to block exploit attempts. 4. Educate administrators to avoid clicking on suspicious links or URLs that could trigger the XSS attack. 5. Monitor logs and network traffic for unusual activity related to the admin interface, including unexpected parameter values. 6. Prepare for rapid deployment of patches or updates once the vendor releases an official fix. 7. Consider implementing Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in the admin interface. 8. Conduct regular security assessments and penetration testing focused on the admin panel to identify and remediate similar vulnerabilities. 9. Isolate the admin interface from the public internet where possible, using internal networks or secure tunnels. 10. Backup critical data regularly to enable recovery in case of compromise.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, Japan, France, Netherlands, South Korea, Italy
CVE-2025-13412: Cross Site Scripting in Campcodes Retro Basketball Shoes Online Store
Description
A vulnerability was determined in Campcodes Retro Basketball Shoes Online Store 1.0. Affected by this issue is some unknown functionality of the file /admin/admin_running.php. Executing a manipulation of the argument product_name can lead to cross site scripting. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-13412 identifies a cross-site scripting (XSS) vulnerability in Campcodes Retro Basketball Shoes Online Store version 1.0. The vulnerability resides in the /admin/admin_running.php file, specifically in the handling of the product_name parameter. An attacker can remotely manipulate this parameter to inject malicious scripts, which are then executed in the context of an administrator's browser session. This can lead to unauthorized actions such as session hijacking, defacement, or theft of sensitive information. The attack vector requires no authentication but does require user interaction, typically the administrator visiting a crafted URL or interface. The CVSS 4.8 score reflects the moderate impact and ease of exploitation, with no privileges required but user interaction necessary. No patches or official fixes have been released, and no known exploits are currently active in the wild. The vulnerability is significant because it affects the administrative interface, which typically has elevated privileges and access to sensitive data and functions. Without proper input validation and output encoding, the product_name parameter can be exploited to execute arbitrary JavaScript code, compromising the integrity and confidentiality of the system. Organizations using this software should implement immediate mitigations such as restricting admin panel access, deploying web application firewalls (WAFs) with XSS filtering, and conducting thorough input sanitization. Monitoring for suspicious activity and preparing for patch deployment once available is critical to reduce risk.
Potential Impact
The primary impact of CVE-2025-13412 is the compromise of administrative sessions through cross-site scripting, potentially allowing attackers to hijack sessions, perform unauthorized administrative actions, or steal sensitive data. This can lead to data integrity issues, unauthorized changes to product listings or pricing, and exposure of confidential business information. Since the vulnerability affects the admin interface, the scope of damage can be significant if exploited. The requirement for user interaction limits automated exploitation but does not eliminate risk, especially in targeted attacks or phishing campaigns. Organizations relying on this software for e-commerce operations may face operational disruptions, reputational damage, and financial losses. The absence of an official patch increases exposure time, and attackers could develop exploits once the vulnerability details are widely known. The vulnerability could also be leveraged as a foothold for further attacks within the network, including privilege escalation or lateral movement. Overall, the threat poses a moderate risk but with potentially severe consequences if exploited in high-value environments.
Mitigation Recommendations
1. Restrict access to the /admin/admin_running.php interface by IP whitelisting or VPN-only access to reduce exposure. 2. Implement strict input validation and output encoding on the product_name parameter to neutralize malicious scripts. 3. Deploy a web application firewall (WAF) with rules specifically targeting XSS payloads to block exploit attempts. 4. Educate administrators to avoid clicking on suspicious links or URLs that could trigger the XSS attack. 5. Monitor logs and network traffic for unusual activity related to the admin interface, including unexpected parameter values. 6. Prepare for rapid deployment of patches or updates once the vendor releases an official fix. 7. Consider implementing Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in the admin interface. 8. Conduct regular security assessments and penetration testing focused on the admin panel to identify and remediate similar vulnerabilities. 9. Isolate the admin interface from the public internet where possible, using internal networks or secure tunnels. 10. Backup critical data regularly to enable recovery in case of compromise.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-19T14:34:05.824Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 691e32d34e81ab18fb4e5e76
Added to database: 11/19/2025, 9:12:51 PM
Last enriched: 2/24/2026, 10:06:46 PM
Last updated: 3/25/2026, 5:49:59 AM
Views: 95
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.