CVE-2025-13582: SQL Injection in code-projects Jonnys Liquor
A security flaw has been discovered in code-projects Jonnys Liquor 1.0. Affected by this issue is some unknown functionality of the file /detail.php of the component GET Parameter Handler. Performing manipulation of the argument Product results in sql injection. Remote exploitation of the attack is possible. The exploit has been released to the public and may be exploited.
AI Analysis
Technical Summary
CVE-2025-13582 identifies a SQL injection vulnerability in the code-projects Jonnys Liquor 1.0 application, specifically within the /detail.php component that handles GET parameters. The vulnerability arises from improper sanitization of the 'Product' parameter, allowing an attacker to inject malicious SQL code remotely without requiring authentication or user interaction. This can lead to unauthorized data access, modification, or deletion within the backend database. The vulnerability is exploitable over the network with low attack complexity and no privileges required, as indicated by the CVSS 4.0 vector (AV:N/AC:L/PR:N/UI:N). The impact on confidentiality, integrity, and availability is limited but significant enough to warrant concern, as attackers could extract sensitive information or corrupt data. Although no active exploits have been observed in the wild, the public availability of an exploit increases the likelihood of attacks. The lack of patches at the time of disclosure necessitates immediate mitigation through secure coding practices such as input validation and the use of parameterized queries. Organizations relying on this software should prioritize vulnerability assessment and remediation to prevent potential breaches.
Potential Impact
For European organizations, this vulnerability poses a risk of unauthorized access to sensitive customer and business data stored in the Jonnys Liquor application database. Exploitation could lead to data leakage, loss of data integrity, or disruption of service availability, impacting business operations and customer trust. Retailers and e-commerce platforms using this software may face regulatory repercussions under GDPR if personal data is compromised. The medium severity score reflects a moderate but tangible threat, especially given the remote and unauthenticated nature of the exploit. The public release of an exploit increases the urgency for European entities to address this vulnerability promptly. Additionally, the potential for data manipulation could affect inventory management and sales reporting, leading to financial losses and reputational damage.
Mitigation Recommendations
1. Immediately audit all instances of code-projects Jonnys Liquor 1.0 for the presence of the vulnerable /detail.php component. 2. Implement strict input validation and sanitization on the 'Product' GET parameter to reject or neutralize malicious input. 3. Refactor database queries to use parameterized statements or prepared queries to prevent SQL injection. 4. Monitor network traffic and application logs for unusual or suspicious requests targeting the 'Product' parameter. 5. Restrict access to the affected application components via web application firewalls (WAFs) with custom rules blocking SQL injection patterns. 6. Engage with the vendor or community to obtain patches or updates addressing this vulnerability and apply them as soon as available. 7. Conduct regular security assessments and penetration testing focusing on injection flaws. 8. Educate developers and administrators on secure coding and configuration practices to prevent similar vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands
CVE-2025-13582: SQL Injection in code-projects Jonnys Liquor
Description
A security flaw has been discovered in code-projects Jonnys Liquor 1.0. Affected by this issue is some unknown functionality of the file /detail.php of the component GET Parameter Handler. Performing manipulation of the argument Product results in sql injection. Remote exploitation of the attack is possible. The exploit has been released to the public and may be exploited.
AI-Powered Analysis
Technical Analysis
CVE-2025-13582 identifies a SQL injection vulnerability in the code-projects Jonnys Liquor 1.0 application, specifically within the /detail.php component that handles GET parameters. The vulnerability arises from improper sanitization of the 'Product' parameter, allowing an attacker to inject malicious SQL code remotely without requiring authentication or user interaction. This can lead to unauthorized data access, modification, or deletion within the backend database. The vulnerability is exploitable over the network with low attack complexity and no privileges required, as indicated by the CVSS 4.0 vector (AV:N/AC:L/PR:N/UI:N). The impact on confidentiality, integrity, and availability is limited but significant enough to warrant concern, as attackers could extract sensitive information or corrupt data. Although no active exploits have been observed in the wild, the public availability of an exploit increases the likelihood of attacks. The lack of patches at the time of disclosure necessitates immediate mitigation through secure coding practices such as input validation and the use of parameterized queries. Organizations relying on this software should prioritize vulnerability assessment and remediation to prevent potential breaches.
Potential Impact
For European organizations, this vulnerability poses a risk of unauthorized access to sensitive customer and business data stored in the Jonnys Liquor application database. Exploitation could lead to data leakage, loss of data integrity, or disruption of service availability, impacting business operations and customer trust. Retailers and e-commerce platforms using this software may face regulatory repercussions under GDPR if personal data is compromised. The medium severity score reflects a moderate but tangible threat, especially given the remote and unauthenticated nature of the exploit. The public release of an exploit increases the urgency for European entities to address this vulnerability promptly. Additionally, the potential for data manipulation could affect inventory management and sales reporting, leading to financial losses and reputational damage.
Mitigation Recommendations
1. Immediately audit all instances of code-projects Jonnys Liquor 1.0 for the presence of the vulnerable /detail.php component. 2. Implement strict input validation and sanitization on the 'Product' GET parameter to reject or neutralize malicious input. 3. Refactor database queries to use parameterized statements or prepared queries to prevent SQL injection. 4. Monitor network traffic and application logs for unusual or suspicious requests targeting the 'Product' parameter. 5. Restrict access to the affected application components via web application firewalls (WAFs) with custom rules blocking SQL injection patterns. 6. Engage with the vendor or community to obtain patches or updates addressing this vulnerability and apply them as soon as available. 7. Conduct regular security assessments and penetration testing focusing on injection flaws. 8. Educate developers and administrators on secure coding and configuration practices to prevent similar vulnerabilities.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-23T09:47:30.949Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6923e5eb1e6a877a1a577011
Added to database: 11/24/2025, 4:58:19 AM
Last enriched: 12/1/2025, 5:19:10 AM
Last updated: 1/8/2026, 6:01:16 PM
Views: 61
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-22587: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Ideagen DevonWay
MediumCVE-2026-22235: CWE-639 Authorization Bypass Through User-Controlled Key in OPEXUS eComplaint
HighCVE-2026-22234: CWE-639 Authorization Bypass Through User-Controlled Key in OPEXUS eCase Portal
CriticalCVE-2026-22233: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in OPEXUS eCASE Audit
MediumCVE-2026-22232: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in OPEXUS eCASE Audit
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.