CVE-2025-14219: Unrestricted Upload in Campcodes Retro Basketball Shoes Online Store
A weakness has been identified in Campcodes Retro Basketball Shoes Online Store 1.0. The impacted element is an unknown function of the file /admin/admin_running.php. Executing manipulation of the argument product_image can lead to unrestricted upload. It is possible to launch the attack remotely. The exploit has been made available to the public and could be exploited.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-14219 affects Campcodes Retro Basketball Shoes Online Store version 1.0, specifically an unrestricted file upload flaw in the /admin/admin_running.php file. The issue arises from insufficient validation or restrictions on the product_image parameter, allowing an authenticated attacker with high privileges to upload arbitrary files remotely. This can lead to the execution of malicious code on the server, potentially compromising the web application and underlying infrastructure. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no user interaction (UI:N), but requires high privileges (PR:H), with low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although no exploits are currently observed in the wild, the availability of proof-of-concept code increases the risk of exploitation. The vulnerability primarily threatens the administrative interface, meaning attackers must already have elevated access, but once exploited, it can lead to significant damage including webshell deployment, data theft, or pivoting within the network. The lack of official patches or mitigations from the vendor further exacerbates the risk. This vulnerability is typical of web applications lacking proper input validation and file upload controls, underscoring the need for secure coding practices and robust access management.
Potential Impact
For European organizations using the Campcodes Retro Basketball Shoes Online Store platform, this vulnerability poses several risks. Successful exploitation could allow attackers to upload malicious files such as web shells, enabling remote code execution and full server compromise. This could lead to data breaches involving customer information, financial data, or intellectual property. Additionally, attackers could deface websites, damaging brand reputation and customer trust. The administrative nature of the vulnerability means that attackers must first gain high-level access, but once inside, the impact could extend beyond the web server to internal networks. Given the e-commerce context, disruption of services could result in financial losses and regulatory penalties under GDPR if personal data is exposed. The medium severity rating reflects the requirement for high privileges but also the ease of remote exploitation without user interaction. Organizations in Europe with online retail operations relying on this software are particularly vulnerable to operational disruption and reputational harm.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately restrict access to the /admin/admin_running.php endpoint to trusted administrative users only, ideally via network segmentation or VPN access. Implement strict server-side validation on file uploads, including whitelisting allowed file types, verifying MIME types, and enforcing file size limits. Employ content scanning to detect malicious payloads within uploaded files. If possible, disable file uploads in the affected parameter until a vendor patch is available. Monitor web server logs and file system changes for suspicious activities indicative of exploitation attempts. Use web application firewalls (WAFs) to detect and block anomalous upload requests targeting the product_image parameter. Regularly audit user privileges to ensure only necessary users have high-level access. Finally, engage with the vendor for patch availability and apply updates promptly once released. Consider deploying intrusion detection systems (IDS) to identify exploitation attempts early.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands
CVE-2025-14219: Unrestricted Upload in Campcodes Retro Basketball Shoes Online Store
Description
A weakness has been identified in Campcodes Retro Basketball Shoes Online Store 1.0. The impacted element is an unknown function of the file /admin/admin_running.php. Executing manipulation of the argument product_image can lead to unrestricted upload. It is possible to launch the attack remotely. The exploit has been made available to the public and could be exploited.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2025-14219 affects Campcodes Retro Basketball Shoes Online Store version 1.0, specifically an unrestricted file upload flaw in the /admin/admin_running.php file. The issue arises from insufficient validation or restrictions on the product_image parameter, allowing an authenticated attacker with high privileges to upload arbitrary files remotely. This can lead to the execution of malicious code on the server, potentially compromising the web application and underlying infrastructure. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no user interaction (UI:N), but requires high privileges (PR:H), with low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although no exploits are currently observed in the wild, the availability of proof-of-concept code increases the risk of exploitation. The vulnerability primarily threatens the administrative interface, meaning attackers must already have elevated access, but once exploited, it can lead to significant damage including webshell deployment, data theft, or pivoting within the network. The lack of official patches or mitigations from the vendor further exacerbates the risk. This vulnerability is typical of web applications lacking proper input validation and file upload controls, underscoring the need for secure coding practices and robust access management.
Potential Impact
For European organizations using the Campcodes Retro Basketball Shoes Online Store platform, this vulnerability poses several risks. Successful exploitation could allow attackers to upload malicious files such as web shells, enabling remote code execution and full server compromise. This could lead to data breaches involving customer information, financial data, or intellectual property. Additionally, attackers could deface websites, damaging brand reputation and customer trust. The administrative nature of the vulnerability means that attackers must first gain high-level access, but once inside, the impact could extend beyond the web server to internal networks. Given the e-commerce context, disruption of services could result in financial losses and regulatory penalties under GDPR if personal data is exposed. The medium severity rating reflects the requirement for high privileges but also the ease of remote exploitation without user interaction. Organizations in Europe with online retail operations relying on this software are particularly vulnerable to operational disruption and reputational harm.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately restrict access to the /admin/admin_running.php endpoint to trusted administrative users only, ideally via network segmentation or VPN access. Implement strict server-side validation on file uploads, including whitelisting allowed file types, verifying MIME types, and enforcing file size limits. Employ content scanning to detect malicious payloads within uploaded files. If possible, disable file uploads in the affected parameter until a vendor patch is available. Monitor web server logs and file system changes for suspicious activities indicative of exploitation attempts. Use web application firewalls (WAFs) to detect and block anomalous upload requests targeting the product_image parameter. Regularly audit user privileges to ensure only necessary users have high-level access. Finally, engage with the vendor for patch availability and apply updates promptly once released. Consider deploying intrusion detection systems (IDS) to identify exploitation attempts early.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-07T15:20:11.868Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69367514232db2b373822965
Added to database: 12/8/2025, 6:49:56 AM
Last enriched: 12/8/2025, 7:05:02 AM
Last updated: 12/8/2025, 12:06:45 PM
Views: 12
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14230: SQL Injection in code-projects Daily Time Recording System
MediumCVE-2025-14229: CSV Injection in SourceCodester Inventory Management System
MediumCVE-2025-14228: Cross Site Scripting in Yealink SIP-T21P E2
MediumCVE-2025-14227: SQL Injection in Philipinho Simple-PHP-Blog
MediumCVE-2025-66461: Unquoted search path or element in GS Yuasa International Ltd. FULLBACK Manager Pro (for Windows)
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.