CVE-2025-13582: SQL Injection in code-projects Jonnys Liquor
A security flaw has been discovered in code-projects Jonnys Liquor 1.0. Affected by this issue is some unknown functionality of the file /detail.php of the component GET Parameter Handler. Performing manipulation of the argument Product results in sql injection. Remote exploitation of the attack is possible. The exploit has been released to the public and may be exploited.
AI Analysis
Technical Summary
CVE-2025-13582 identifies a SQL injection vulnerability in the code-projects Jonnys Liquor 1.0 application, specifically in the /detail.php file's GET parameter handler for the 'Product' argument. The vulnerability arises from improper sanitization of user-supplied input, allowing an attacker to inject malicious SQL code remotely without requiring authentication or user interaction. The flaw enables attackers to manipulate backend database queries, potentially leading to unauthorized data disclosure, data modification, or denial of service through database corruption or crashes. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the network attack vector, low complexity, no privileges or user interaction needed, and partial impact on confidentiality, integrity, and availability. Although no active exploitation has been reported, a public exploit is available, increasing the risk of attacks. The vulnerability affects only version 1.0 of Jonnys Liquor, and no official patches have been published yet. The lack of secure coding practices such as parameterized queries or input validation in the affected component is the root cause. Organizations using this software should consider immediate mitigations to prevent exploitation while awaiting official patches.
Potential Impact
For European organizations, exploitation of this SQL injection vulnerability could lead to significant data breaches, including exposure of customer data, pricing, inventory, or transactional records. This could result in financial losses, regulatory penalties under GDPR for data exposure, and reputational damage. Integrity of business data could be compromised, leading to incorrect inventory or sales records, impacting operational decisions. Availability of the application could be disrupted if attackers execute commands causing database crashes or lockups. Retailers and distributors using Jonnys Liquor software are particularly at risk, as attackers could manipulate product details or pricing information. The remote, unauthenticated nature of the vulnerability increases the likelihood of exploitation attempts, especially given the public availability of an exploit. Organizations may also face compliance issues if sensitive personal or payment data is exposed due to this flaw.
Mitigation Recommendations
1. Immediately implement input validation and sanitization on the 'Product' GET parameter to block malicious SQL syntax. 2. Refactor the vulnerable code to use parameterized queries or prepared statements to prevent SQL injection. 3. Restrict database user permissions to the minimum necessary, avoiding use of high-privilege accounts for application queries. 4. Monitor database logs and application logs for unusual query patterns or errors indicative of injection attempts. 5. Employ Web Application Firewalls (WAFs) with rules targeting SQL injection signatures to provide an additional layer of defense. 6. If patching is not immediately available, consider temporarily disabling or restricting access to the vulnerable /detail.php endpoint. 7. Conduct security audits and code reviews to identify and remediate similar injection flaws elsewhere in the application. 8. Educate developers on secure coding practices to prevent recurrence. 9. Prepare incident response plans to quickly address any exploitation attempts. 10. Stay updated with vendor advisories for official patches or updates.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Netherlands, Belgium, Poland
CVE-2025-13582: SQL Injection in code-projects Jonnys Liquor
Description
A security flaw has been discovered in code-projects Jonnys Liquor 1.0. Affected by this issue is some unknown functionality of the file /detail.php of the component GET Parameter Handler. Performing manipulation of the argument Product results in sql injection. Remote exploitation of the attack is possible. The exploit has been released to the public and may be exploited.
AI-Powered Analysis
Technical Analysis
CVE-2025-13582 identifies a SQL injection vulnerability in the code-projects Jonnys Liquor 1.0 application, specifically in the /detail.php file's GET parameter handler for the 'Product' argument. The vulnerability arises from improper sanitization of user-supplied input, allowing an attacker to inject malicious SQL code remotely without requiring authentication or user interaction. The flaw enables attackers to manipulate backend database queries, potentially leading to unauthorized data disclosure, data modification, or denial of service through database corruption or crashes. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the network attack vector, low complexity, no privileges or user interaction needed, and partial impact on confidentiality, integrity, and availability. Although no active exploitation has been reported, a public exploit is available, increasing the risk of attacks. The vulnerability affects only version 1.0 of Jonnys Liquor, and no official patches have been published yet. The lack of secure coding practices such as parameterized queries or input validation in the affected component is the root cause. Organizations using this software should consider immediate mitigations to prevent exploitation while awaiting official patches.
Potential Impact
For European organizations, exploitation of this SQL injection vulnerability could lead to significant data breaches, including exposure of customer data, pricing, inventory, or transactional records. This could result in financial losses, regulatory penalties under GDPR for data exposure, and reputational damage. Integrity of business data could be compromised, leading to incorrect inventory or sales records, impacting operational decisions. Availability of the application could be disrupted if attackers execute commands causing database crashes or lockups. Retailers and distributors using Jonnys Liquor software are particularly at risk, as attackers could manipulate product details or pricing information. The remote, unauthenticated nature of the vulnerability increases the likelihood of exploitation attempts, especially given the public availability of an exploit. Organizations may also face compliance issues if sensitive personal or payment data is exposed due to this flaw.
Mitigation Recommendations
1. Immediately implement input validation and sanitization on the 'Product' GET parameter to block malicious SQL syntax. 2. Refactor the vulnerable code to use parameterized queries or prepared statements to prevent SQL injection. 3. Restrict database user permissions to the minimum necessary, avoiding use of high-privilege accounts for application queries. 4. Monitor database logs and application logs for unusual query patterns or errors indicative of injection attempts. 5. Employ Web Application Firewalls (WAFs) with rules targeting SQL injection signatures to provide an additional layer of defense. 6. If patching is not immediately available, consider temporarily disabling or restricting access to the vulnerable /detail.php endpoint. 7. Conduct security audits and code reviews to identify and remediate similar injection flaws elsewhere in the application. 8. Educate developers on secure coding practices to prevent recurrence. 9. Prepare incident response plans to quickly address any exploitation attempts. 10. Stay updated with vendor advisories for official patches or updates.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-23T09:47:30.949Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6923e5eb1e6a877a1a577011
Added to database: 11/24/2025, 4:58:19 AM
Last enriched: 11/24/2025, 5:05:19 AM
Last updated: 11/24/2025, 3:02:40 PM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13541
LowCVE-2025-13598
LowCVE-2025-11921: CWE-732 Incorrect Permission Assignment for Critical Resource in Bjango iStats
CriticalSecond Sha1-Hulud Wave Affects 25,000+ Repositories via npm Preinstall Credential Theft
MediumCVE-2025-65503: n/a
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.