Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14219: Unrestricted Upload in Campcodes Retro Basketball Shoes Online Store

0
Medium
VulnerabilityCVE-2025-14219cvecve-2025-14219
Published: Mon Dec 08 2025 (12/08/2025, 06:02:07 UTC)
Source: CVE Database V5
Vendor/Project: Campcodes
Product: Retro Basketball Shoes Online Store

Description

A weakness has been identified in Campcodes Retro Basketball Shoes Online Store 1.0. The impacted element is an unknown function of the file /admin/admin_running.php. Executing manipulation of the argument product_image can lead to unrestricted upload. It is possible to launch the attack remotely. The exploit has been made available to the public and could be exploited.

AI-Powered Analysis

AILast updated: 12/08/2025, 07:05:02 UTC

Technical Analysis

The vulnerability identified as CVE-2025-14219 affects Campcodes Retro Basketball Shoes Online Store version 1.0, specifically an unrestricted file upload flaw in the /admin/admin_running.php file. The issue arises from insufficient validation or restrictions on the product_image parameter, allowing an authenticated attacker with high privileges to upload arbitrary files remotely. This can lead to the execution of malicious code on the server, potentially compromising the web application and underlying infrastructure. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no user interaction (UI:N), but requires high privileges (PR:H), with low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although no exploits are currently observed in the wild, the availability of proof-of-concept code increases the risk of exploitation. The vulnerability primarily threatens the administrative interface, meaning attackers must already have elevated access, but once exploited, it can lead to significant damage including webshell deployment, data theft, or pivoting within the network. The lack of official patches or mitigations from the vendor further exacerbates the risk. This vulnerability is typical of web applications lacking proper input validation and file upload controls, underscoring the need for secure coding practices and robust access management.

Potential Impact

For European organizations using the Campcodes Retro Basketball Shoes Online Store platform, this vulnerability poses several risks. Successful exploitation could allow attackers to upload malicious files such as web shells, enabling remote code execution and full server compromise. This could lead to data breaches involving customer information, financial data, or intellectual property. Additionally, attackers could deface websites, damaging brand reputation and customer trust. The administrative nature of the vulnerability means that attackers must first gain high-level access, but once inside, the impact could extend beyond the web server to internal networks. Given the e-commerce context, disruption of services could result in financial losses and regulatory penalties under GDPR if personal data is exposed. The medium severity rating reflects the requirement for high privileges but also the ease of remote exploitation without user interaction. Organizations in Europe with online retail operations relying on this software are particularly vulnerable to operational disruption and reputational harm.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately restrict access to the /admin/admin_running.php endpoint to trusted administrative users only, ideally via network segmentation or VPN access. Implement strict server-side validation on file uploads, including whitelisting allowed file types, verifying MIME types, and enforcing file size limits. Employ content scanning to detect malicious payloads within uploaded files. If possible, disable file uploads in the affected parameter until a vendor patch is available. Monitor web server logs and file system changes for suspicious activities indicative of exploitation attempts. Use web application firewalls (WAFs) to detect and block anomalous upload requests targeting the product_image parameter. Regularly audit user privileges to ensure only necessary users have high-level access. Finally, engage with the vendor for patch availability and apply updates promptly once released. Consider deploying intrusion detection systems (IDS) to identify exploitation attempts early.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-07T15:20:11.868Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69367514232db2b373822965

Added to database: 12/8/2025, 6:49:56 AM

Last enriched: 12/8/2025, 7:05:02 AM

Last updated: 12/8/2025, 12:06:45 PM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats