CVE-2025-14246: SQL Injection in code-projects Simple Shopping Cart
A vulnerability was found in code-projects Simple Shopping Cart 1.0. This vulnerability affects unknown code of the file /Customers/settings.php. Performing manipulation of the argument user_id results in sql injection. Remote exploitation of the attack is possible. The exploit has been made public and could be used.
AI Analysis
Technical Summary
CVE-2025-14246 is an SQL injection vulnerability identified in the Simple Shopping Cart 1.0 product developed by code-projects. The vulnerability resides in the /Customers/settings.php file, specifically in the handling of the user_id parameter. An attacker can remotely exploit this flaw by manipulating the user_id argument to inject malicious SQL code, potentially allowing unauthorized access to or modification of the backend database. The vulnerability does not require authentication or user interaction, increasing its risk profile. The CVSS 4.0 base score is 5.3, reflecting a medium severity level due to the limited scope of impact and the requirement for low privileges (PR:L). The vulnerability affects the confidentiality, integrity, and availability of data to a limited extent (VC:L, VI:L, VA:L). No official patches have been released yet, and while the exploit code is publicly available, there are no confirmed reports of active exploitation in the wild. The vulnerability is typical of improper input sanitization and lack of parameterized queries in web applications, which are common causes of SQL injection. Organizations using this shopping cart software should urgently review their code and apply secure coding practices to mitigate the risk.
Potential Impact
For European organizations, this vulnerability poses a risk of unauthorized data disclosure, data manipulation, and potential disruption of e-commerce operations. Compromise of customer data could lead to privacy violations under GDPR, resulting in regulatory penalties and reputational damage. The ability to remotely exploit the vulnerability without authentication increases the attack surface, especially for small and medium-sized enterprises that may lack robust security controls. Although the affected product is niche, any breach could disrupt business continuity and customer trust. Additionally, attackers could leverage this vulnerability as a foothold to pivot into broader network infrastructure if the shopping cart system is integrated with other internal systems. The medium severity indicates a moderate but tangible risk that should not be ignored, particularly in sectors handling sensitive customer payment information.
Mitigation Recommendations
1. Immediate code review and remediation of the /Customers/settings.php file to implement parameterized queries or prepared statements for all database interactions involving user_id. 2. Implement strict input validation and sanitization to reject or neutralize malicious input before it reaches the database layer. 3. Deploy Web Application Firewalls (WAF) with SQL injection detection rules tailored to the Simple Shopping Cart application to block exploit attempts. 4. Monitor database logs and application logs for unusual queries or access patterns indicative of SQL injection attempts. 5. Restrict database user privileges to the minimum necessary to limit the impact of a successful injection. 6. If patching is not immediately possible, consider isolating the affected application from critical internal networks and sensitive data stores. 7. Educate developers and administrators on secure coding practices and the importance of timely patching. 8. Engage with the vendor or community for updates or patches and apply them promptly once available.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-14246: SQL Injection in code-projects Simple Shopping Cart
Description
A vulnerability was found in code-projects Simple Shopping Cart 1.0. This vulnerability affects unknown code of the file /Customers/settings.php. Performing manipulation of the argument user_id results in sql injection. Remote exploitation of the attack is possible. The exploit has been made public and could be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-14246 is an SQL injection vulnerability identified in the Simple Shopping Cart 1.0 product developed by code-projects. The vulnerability resides in the /Customers/settings.php file, specifically in the handling of the user_id parameter. An attacker can remotely exploit this flaw by manipulating the user_id argument to inject malicious SQL code, potentially allowing unauthorized access to or modification of the backend database. The vulnerability does not require authentication or user interaction, increasing its risk profile. The CVSS 4.0 base score is 5.3, reflecting a medium severity level due to the limited scope of impact and the requirement for low privileges (PR:L). The vulnerability affects the confidentiality, integrity, and availability of data to a limited extent (VC:L, VI:L, VA:L). No official patches have been released yet, and while the exploit code is publicly available, there are no confirmed reports of active exploitation in the wild. The vulnerability is typical of improper input sanitization and lack of parameterized queries in web applications, which are common causes of SQL injection. Organizations using this shopping cart software should urgently review their code and apply secure coding practices to mitigate the risk.
Potential Impact
For European organizations, this vulnerability poses a risk of unauthorized data disclosure, data manipulation, and potential disruption of e-commerce operations. Compromise of customer data could lead to privacy violations under GDPR, resulting in regulatory penalties and reputational damage. The ability to remotely exploit the vulnerability without authentication increases the attack surface, especially for small and medium-sized enterprises that may lack robust security controls. Although the affected product is niche, any breach could disrupt business continuity and customer trust. Additionally, attackers could leverage this vulnerability as a foothold to pivot into broader network infrastructure if the shopping cart system is integrated with other internal systems. The medium severity indicates a moderate but tangible risk that should not be ignored, particularly in sectors handling sensitive customer payment information.
Mitigation Recommendations
1. Immediate code review and remediation of the /Customers/settings.php file to implement parameterized queries or prepared statements for all database interactions involving user_id. 2. Implement strict input validation and sanitization to reject or neutralize malicious input before it reaches the database layer. 3. Deploy Web Application Firewalls (WAF) with SQL injection detection rules tailored to the Simple Shopping Cart application to block exploit attempts. 4. Monitor database logs and application logs for unusual queries or access patterns indicative of SQL injection attempts. 5. Restrict database user privileges to the minimum necessary to limit the impact of a successful injection. 6. If patching is not immediately possible, consider isolating the affected application from critical internal networks and sensitive data stores. 7. Educate developers and administrators on secure coding practices and the importance of timely patching. 8. Engage with the vendor or community for updates or patches and apply them promptly once available.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-08T05:50:47.717Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6936d63fdc63120ed944e4be
Added to database: 12/8/2025, 1:44:31 PM
Last enriched: 12/8/2025, 1:59:33 PM
Last updated: 12/11/2025, 2:42:25 AM
Views: 37
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-67720: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Mayuri-Chan pyrofork
MediumCVE-2025-67719: CWE-620: Unverified Password Change in ibexa user
HighCVE-2025-67716: CWE-184: Incomplete List of Disallowed Inputs in auth0 nextjs-auth0
MediumCVE-2025-67511: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') in aliasrobotics cai
CriticalCVE-2025-67713: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in miniflux v2
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.