CVE-2025-13412: Cross Site Scripting in Campcodes Retro Basketball Shoes Online Store
A vulnerability was determined in Campcodes Retro Basketball Shoes Online Store 1.0. Affected by this issue is some unknown functionality of the file /admin/admin_running.php. Executing manipulation of the argument product_name can lead to cross site scripting. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized.
AI Analysis
Technical Summary
CVE-2025-13412 identifies a cross-site scripting (XSS) vulnerability in the Campcodes Retro Basketball Shoes Online Store version 1.0, specifically within the /admin/admin_running.php file. The vulnerability is triggered by manipulation of the product_name parameter, which is not properly sanitized or encoded before being reflected in the admin interface. This flaw allows an attacker with authenticated access to inject malicious JavaScript code that executes in the context of the administrator's browser session. The attack vector is remote, but requires the attacker to have valid credentials (PR:H) and some user interaction (UI:P), such as clicking a crafted link or viewing a manipulated page. The vulnerability does not impact confidentiality directly but can lead to session hijacking, privilege escalation, or unauthorized administrative actions, thereby affecting integrity and availability indirectly. The CVSS 4.0 vector indicates no privileges are required beyond authentication, low complexity, and no impact on confidentiality or availability, but some impact on integrity (VI:L). No patches or official fixes have been published yet, and no known exploits are currently active in the wild, though the exploit details have been publicly disclosed. This vulnerability highlights the importance of proper input validation and output encoding in web applications, especially in administrative modules that control critical business functions.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to the integrity and security of administrative operations within the affected e-commerce platform. If exploited, attackers could hijack admin sessions, manipulate product data, or perform unauthorized actions, potentially disrupting business operations or leading to fraudulent transactions. Given that the vulnerability requires authenticated access, the threat is more significant if credential compromise or insider threats exist. The impact is heightened for organizations relying on this specific software for online retail, as compromised admin panels can lead to reputational damage and financial loss. Additionally, the presence of publicly disclosed exploit information increases the risk of opportunistic attacks. European data protection regulations such as GDPR may impose additional compliance risks if customer data is indirectly exposed or manipulated through such attacks. Organizations with limited security monitoring or weak access controls on admin interfaces are particularly vulnerable.
Mitigation Recommendations
To mitigate this vulnerability, organizations should implement strict input validation and output encoding on the product_name parameter within the /admin/admin_running.php file to prevent script injection. Applying a Content Security Policy (CSP) can help restrict the execution of unauthorized scripts in the admin interface. Access to the admin panel should be limited using network-level controls such as IP whitelisting or VPNs to reduce exposure. Multi-factor authentication (MFA) should be enforced for all administrative accounts to reduce the risk of credential compromise. Regularly monitoring admin access logs for suspicious activity can help detect exploitation attempts early. Since no official patch is currently available, consider isolating or restricting the vulnerable module until a fix is released. Additionally, educating administrators about phishing and social engineering risks can reduce the likelihood of attackers gaining authenticated access. Finally, organizations should stay updated with vendor advisories for any forthcoming patches or updates.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-13412: Cross Site Scripting in Campcodes Retro Basketball Shoes Online Store
Description
A vulnerability was determined in Campcodes Retro Basketball Shoes Online Store 1.0. Affected by this issue is some unknown functionality of the file /admin/admin_running.php. Executing manipulation of the argument product_name can lead to cross site scripting. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized.
AI-Powered Analysis
Technical Analysis
CVE-2025-13412 identifies a cross-site scripting (XSS) vulnerability in the Campcodes Retro Basketball Shoes Online Store version 1.0, specifically within the /admin/admin_running.php file. The vulnerability is triggered by manipulation of the product_name parameter, which is not properly sanitized or encoded before being reflected in the admin interface. This flaw allows an attacker with authenticated access to inject malicious JavaScript code that executes in the context of the administrator's browser session. The attack vector is remote, but requires the attacker to have valid credentials (PR:H) and some user interaction (UI:P), such as clicking a crafted link or viewing a manipulated page. The vulnerability does not impact confidentiality directly but can lead to session hijacking, privilege escalation, or unauthorized administrative actions, thereby affecting integrity and availability indirectly. The CVSS 4.0 vector indicates no privileges are required beyond authentication, low complexity, and no impact on confidentiality or availability, but some impact on integrity (VI:L). No patches or official fixes have been published yet, and no known exploits are currently active in the wild, though the exploit details have been publicly disclosed. This vulnerability highlights the importance of proper input validation and output encoding in web applications, especially in administrative modules that control critical business functions.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to the integrity and security of administrative operations within the affected e-commerce platform. If exploited, attackers could hijack admin sessions, manipulate product data, or perform unauthorized actions, potentially disrupting business operations or leading to fraudulent transactions. Given that the vulnerability requires authenticated access, the threat is more significant if credential compromise or insider threats exist. The impact is heightened for organizations relying on this specific software for online retail, as compromised admin panels can lead to reputational damage and financial loss. Additionally, the presence of publicly disclosed exploit information increases the risk of opportunistic attacks. European data protection regulations such as GDPR may impose additional compliance risks if customer data is indirectly exposed or manipulated through such attacks. Organizations with limited security monitoring or weak access controls on admin interfaces are particularly vulnerable.
Mitigation Recommendations
To mitigate this vulnerability, organizations should implement strict input validation and output encoding on the product_name parameter within the /admin/admin_running.php file to prevent script injection. Applying a Content Security Policy (CSP) can help restrict the execution of unauthorized scripts in the admin interface. Access to the admin panel should be limited using network-level controls such as IP whitelisting or VPNs to reduce exposure. Multi-factor authentication (MFA) should be enforced for all administrative accounts to reduce the risk of credential compromise. Regularly monitoring admin access logs for suspicious activity can help detect exploitation attempts early. Since no official patch is currently available, consider isolating or restricting the vulnerable module until a fix is released. Additionally, educating administrators about phishing and social engineering risks can reduce the likelihood of attackers gaining authenticated access. Finally, organizations should stay updated with vendor advisories for any forthcoming patches or updates.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-19T14:34:05.824Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 691e32d34e81ab18fb4e5e76
Added to database: 11/19/2025, 9:12:51 PM
Last enriched: 11/26/2025, 10:07:44 PM
Last updated: 1/7/2026, 5:28:23 AM
Views: 58
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0650: CWE-306 Missing Authentication for Critical Function in OpenFlagr Flagr
CriticalCVE-2025-15474: CWE-770 Allocation of Resources Without Limits or Throttling in AuntyFey AuntyFey Smart Combination Lock
MediumCVE-2025-14468: CWE-352 Cross-Site Request Forgery (CSRF) in mohammed_kaludi AMP for WP – Accelerated Mobile Pages
MediumCVE-2025-9611: CWE-749 Exposed Dangerous Method or Function in Microsoft Playwright
HighCVE-2026-22162
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.