Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13412: Cross Site Scripting in Campcodes Retro Basketball Shoes Online Store

0
Medium
VulnerabilityCVE-2025-13412cvecve-2025-13412
Published: Wed Nov 19 2025 (11/19/2025, 21:02:05 UTC)
Source: CVE Database V5
Vendor/Project: Campcodes
Product: Retro Basketball Shoes Online Store

Description

A vulnerability was determined in Campcodes Retro Basketball Shoes Online Store 1.0. Affected by this issue is some unknown functionality of the file /admin/admin_running.php. Executing a manipulation of the argument product_name can lead to cross site scripting. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 22:06:46 UTC

Technical Analysis

CVE-2025-13412 identifies a cross-site scripting (XSS) vulnerability in Campcodes Retro Basketball Shoes Online Store version 1.0. The vulnerability resides in the /admin/admin_running.php file, specifically in the handling of the product_name parameter. An attacker can remotely manipulate this parameter to inject malicious scripts, which are then executed in the context of an administrator's browser session. This can lead to unauthorized actions such as session hijacking, defacement, or theft of sensitive information. The attack vector requires no authentication but does require user interaction, typically the administrator visiting a crafted URL or interface. The CVSS 4.8 score reflects the moderate impact and ease of exploitation, with no privileges required but user interaction necessary. No patches or official fixes have been released, and no known exploits are currently active in the wild. The vulnerability is significant because it affects the administrative interface, which typically has elevated privileges and access to sensitive data and functions. Without proper input validation and output encoding, the product_name parameter can be exploited to execute arbitrary JavaScript code, compromising the integrity and confidentiality of the system. Organizations using this software should implement immediate mitigations such as restricting admin panel access, deploying web application firewalls (WAFs) with XSS filtering, and conducting thorough input sanitization. Monitoring for suspicious activity and preparing for patch deployment once available is critical to reduce risk.

Potential Impact

The primary impact of CVE-2025-13412 is the compromise of administrative sessions through cross-site scripting, potentially allowing attackers to hijack sessions, perform unauthorized administrative actions, or steal sensitive data. This can lead to data integrity issues, unauthorized changes to product listings or pricing, and exposure of confidential business information. Since the vulnerability affects the admin interface, the scope of damage can be significant if exploited. The requirement for user interaction limits automated exploitation but does not eliminate risk, especially in targeted attacks or phishing campaigns. Organizations relying on this software for e-commerce operations may face operational disruptions, reputational damage, and financial losses. The absence of an official patch increases exposure time, and attackers could develop exploits once the vulnerability details are widely known. The vulnerability could also be leveraged as a foothold for further attacks within the network, including privilege escalation or lateral movement. Overall, the threat poses a moderate risk but with potentially severe consequences if exploited in high-value environments.

Mitigation Recommendations

1. Restrict access to the /admin/admin_running.php interface by IP whitelisting or VPN-only access to reduce exposure. 2. Implement strict input validation and output encoding on the product_name parameter to neutralize malicious scripts. 3. Deploy a web application firewall (WAF) with rules specifically targeting XSS payloads to block exploit attempts. 4. Educate administrators to avoid clicking on suspicious links or URLs that could trigger the XSS attack. 5. Monitor logs and network traffic for unusual activity related to the admin interface, including unexpected parameter values. 6. Prepare for rapid deployment of patches or updates once the vendor releases an official fix. 7. Consider implementing Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in the admin interface. 8. Conduct regular security assessments and penetration testing focused on the admin panel to identify and remediate similar vulnerabilities. 9. Isolate the admin interface from the public internet where possible, using internal networks or secure tunnels. 10. Backup critical data regularly to enable recovery in case of compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-19T14:34:05.824Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691e32d34e81ab18fb4e5e76

Added to database: 11/19/2025, 9:12:51 PM

Last enriched: 2/24/2026, 10:06:46 PM

Last updated: 3/25/2026, 4:44:01 AM

Views: 94

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses