CVE-2025-13423: Unrestricted Upload in Campcodes Retro Basketball Shoes Online Store
A flaw has been found in Campcodes Retro Basketball Shoes Online Store 1.0. The impacted element is an unknown function of the file /admin/admin_product.php. Executing manipulation of the argument product_image can lead to unrestricted upload. The attack may be launched remotely. The exploit has been published and may be used.
AI Analysis
Technical Summary
CVE-2025-13423 identifies a vulnerability in the Campcodes Retro Basketball Shoes Online Store version 1.0, specifically in the /admin/admin_product.php file. The flaw arises from insufficient validation of the product_image parameter, which allows an attacker with administrative privileges to perform unrestricted file uploads. This means an authenticated admin user can upload arbitrary files, including potentially malicious scripts, without restrictions on file type or content. Since the vulnerability is located in an admin interface, exploitation requires high-level privileges, but no user interaction is needed once authenticated. The vulnerability is remotely exploitable, enabling attackers to upload web shells or other malicious payloads that could lead to full server compromise, data theft, or defacement. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required (PR:H means high privileges required), no user interaction, and low impact on confidentiality, integrity, and availability individually, but combined they present a moderate risk. No patches or official fixes have been published yet, and no known exploits are reported in the wild, though proof-of-concept code has been disclosed. This vulnerability highlights the importance of secure file upload handling and strict access control in e-commerce platforms.
Potential Impact
For European organizations using the Campcodes Retro Basketball Shoes Online Store 1.0, this vulnerability poses a moderate risk. Successful exploitation could allow attackers with admin credentials to upload malicious files, potentially leading to server takeover, unauthorized data access, or disruption of online store operations. This can result in loss of customer trust, financial damage, and regulatory penalties under GDPR if personal data is compromised. The impact on confidentiality, integrity, and availability is moderate but significant due to the administrative nature of the access required. Organizations with weak internal controls or compromised admin accounts are particularly vulnerable. The threat could also facilitate further lateral movement within the network, increasing overall risk.
Mitigation Recommendations
1. Immediately restrict access to the /admin/admin_product.php interface to trusted personnel only and enforce strong authentication mechanisms such as multi-factor authentication (MFA) for admin accounts. 2. Implement strict server-side validation of uploaded files, including checking file types, sizes, and scanning for malicious content before acceptance. 3. Employ allowlists for permitted file extensions and reject all others. 4. Use separate storage locations for uploaded files with no execution permissions to prevent uploaded scripts from running. 5. Monitor logs for unusual file upload activity or admin interface access patterns. 6. If possible, isolate the e-commerce platform in a segmented network zone to limit lateral movement. 7. Regularly update and patch the platform once a vendor fix becomes available. 8. Conduct security audits and penetration tests focusing on file upload functionalities and admin interfaces.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
CVE-2025-13423: Unrestricted Upload in Campcodes Retro Basketball Shoes Online Store
Description
A flaw has been found in Campcodes Retro Basketball Shoes Online Store 1.0. The impacted element is an unknown function of the file /admin/admin_product.php. Executing manipulation of the argument product_image can lead to unrestricted upload. The attack may be launched remotely. The exploit has been published and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-13423 identifies a vulnerability in the Campcodes Retro Basketball Shoes Online Store version 1.0, specifically in the /admin/admin_product.php file. The flaw arises from insufficient validation of the product_image parameter, which allows an attacker with administrative privileges to perform unrestricted file uploads. This means an authenticated admin user can upload arbitrary files, including potentially malicious scripts, without restrictions on file type or content. Since the vulnerability is located in an admin interface, exploitation requires high-level privileges, but no user interaction is needed once authenticated. The vulnerability is remotely exploitable, enabling attackers to upload web shells or other malicious payloads that could lead to full server compromise, data theft, or defacement. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required (PR:H means high privileges required), no user interaction, and low impact on confidentiality, integrity, and availability individually, but combined they present a moderate risk. No patches or official fixes have been published yet, and no known exploits are reported in the wild, though proof-of-concept code has been disclosed. This vulnerability highlights the importance of secure file upload handling and strict access control in e-commerce platforms.
Potential Impact
For European organizations using the Campcodes Retro Basketball Shoes Online Store 1.0, this vulnerability poses a moderate risk. Successful exploitation could allow attackers with admin credentials to upload malicious files, potentially leading to server takeover, unauthorized data access, or disruption of online store operations. This can result in loss of customer trust, financial damage, and regulatory penalties under GDPR if personal data is compromised. The impact on confidentiality, integrity, and availability is moderate but significant due to the administrative nature of the access required. Organizations with weak internal controls or compromised admin accounts are particularly vulnerable. The threat could also facilitate further lateral movement within the network, increasing overall risk.
Mitigation Recommendations
1. Immediately restrict access to the /admin/admin_product.php interface to trusted personnel only and enforce strong authentication mechanisms such as multi-factor authentication (MFA) for admin accounts. 2. Implement strict server-side validation of uploaded files, including checking file types, sizes, and scanning for malicious content before acceptance. 3. Employ allowlists for permitted file extensions and reject all others. 4. Use separate storage locations for uploaded files with no execution permissions to prevent uploaded scripts from running. 5. Monitor logs for unusual file upload activity or admin interface access patterns. 6. If possible, isolate the e-commerce platform in a segmented network zone to limit lateral movement. 7. Regularly update and patch the platform once a vendor fix becomes available. 8. Conduct security audits and penetration tests focusing on file upload functionalities and admin interfaces.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-19T15:01:19.558Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 691e5586f78d7eef03e60e30
Added to database: 11/19/2025, 11:40:54 PM
Last enriched: 11/19/2025, 11:55:51 PM
Last updated: 11/20/2025, 2:04:07 AM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13442: Command Injection in UTT 进取 750W
MediumCVE-2025-13435: Path Traversal in Dreampie Resty
MediumCVE-2025-13434: Improper Neutralization of HTTP Headers for Scripting Syntax in jameschz Hush Framework
MediumCVE-2025-13433: Unquoted Search Path in Muse Group MuseHub
HighCVE-2025-13424: SQL Injection in Campcodes Supplier Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.