Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13412: Cross Site Scripting in Campcodes Retro Basketball Shoes Online Store

0
Medium
VulnerabilityCVE-2025-13412cvecve-2025-13412
Published: Wed Nov 19 2025 (11/19/2025, 21:02:05 UTC)
Source: CVE Database V5
Vendor/Project: Campcodes
Product: Retro Basketball Shoes Online Store

Description

A vulnerability was determined in Campcodes Retro Basketball Shoes Online Store 1.0. Affected by this issue is some unknown functionality of the file /admin/admin_running.php. Executing manipulation of the argument product_name can lead to cross site scripting. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized.

AI-Powered Analysis

AILast updated: 11/26/2025, 22:07:44 UTC

Technical Analysis

CVE-2025-13412 identifies a cross-site scripting (XSS) vulnerability in the Campcodes Retro Basketball Shoes Online Store version 1.0, specifically within the /admin/admin_running.php file. The vulnerability is triggered by manipulation of the product_name parameter, which is not properly sanitized or encoded before being reflected in the admin interface. This flaw allows an attacker with authenticated access to inject malicious JavaScript code that executes in the context of the administrator's browser session. The attack vector is remote, but requires the attacker to have valid credentials (PR:H) and some user interaction (UI:P), such as clicking a crafted link or viewing a manipulated page. The vulnerability does not impact confidentiality directly but can lead to session hijacking, privilege escalation, or unauthorized administrative actions, thereby affecting integrity and availability indirectly. The CVSS 4.0 vector indicates no privileges are required beyond authentication, low complexity, and no impact on confidentiality or availability, but some impact on integrity (VI:L). No patches or official fixes have been published yet, and no known exploits are currently active in the wild, though the exploit details have been publicly disclosed. This vulnerability highlights the importance of proper input validation and output encoding in web applications, especially in administrative modules that control critical business functions.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to the integrity and security of administrative operations within the affected e-commerce platform. If exploited, attackers could hijack admin sessions, manipulate product data, or perform unauthorized actions, potentially disrupting business operations or leading to fraudulent transactions. Given that the vulnerability requires authenticated access, the threat is more significant if credential compromise or insider threats exist. The impact is heightened for organizations relying on this specific software for online retail, as compromised admin panels can lead to reputational damage and financial loss. Additionally, the presence of publicly disclosed exploit information increases the risk of opportunistic attacks. European data protection regulations such as GDPR may impose additional compliance risks if customer data is indirectly exposed or manipulated through such attacks. Organizations with limited security monitoring or weak access controls on admin interfaces are particularly vulnerable.

Mitigation Recommendations

To mitigate this vulnerability, organizations should implement strict input validation and output encoding on the product_name parameter within the /admin/admin_running.php file to prevent script injection. Applying a Content Security Policy (CSP) can help restrict the execution of unauthorized scripts in the admin interface. Access to the admin panel should be limited using network-level controls such as IP whitelisting or VPNs to reduce exposure. Multi-factor authentication (MFA) should be enforced for all administrative accounts to reduce the risk of credential compromise. Regularly monitoring admin access logs for suspicious activity can help detect exploitation attempts early. Since no official patch is currently available, consider isolating or restricting the vulnerable module until a fix is released. Additionally, educating administrators about phishing and social engineering risks can reduce the likelihood of attackers gaining authenticated access. Finally, organizations should stay updated with vendor advisories for any forthcoming patches or updates.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-19T14:34:05.824Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691e32d34e81ab18fb4e5e76

Added to database: 11/19/2025, 9:12:51 PM

Last enriched: 11/26/2025, 10:07:44 PM

Last updated: 1/7/2026, 5:28:23 AM

Views: 58

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats