CVE-2025-14529: SQL Injection in Campcodes Retro Basketball Shoes Online Store
A flaw has been found in Campcodes Retro Basketball Shoes Online Store 1.0. The affected element is an unknown function of the file /admin/admin_running.php. This manipulation of the argument pid causes sql injection. It is possible to initiate the attack remotely. The exploit has been published and may be used.
AI Analysis
Technical Summary
CVE-2025-14529 identifies a SQL injection vulnerability in the Campcodes Retro Basketball Shoes Online Store version 1.0, located in the /admin/admin_running.php file. The vulnerability arises from improper sanitization of the 'pid' parameter, which is used in SQL queries without adequate validation or parameterization. An attacker can remotely exploit this flaw without requiring authentication or user interaction, by sending crafted requests that manipulate the SQL query logic. This can lead to unauthorized access to the backend database, allowing attackers to read, modify, or delete sensitive data, potentially affecting confidentiality, integrity, and availability of the system. The CVSS 4.0 score of 6.9 (medium severity) reflects the network attack vector, low complexity, and no required privileges or user interaction, but limited impact scope. No patches or vendor advisories are currently available, and no known exploits have been observed in the wild, though a public exploit has been published, increasing the risk of exploitation. The vulnerability primarily threatens the administrative interface, which may contain sensitive business and customer data. Exploitation could lead to data leakage, unauthorized transactions, or disruption of e-commerce operations. Given the nature of the vulnerability, attackers could automate exploitation attempts, increasing the risk to organizations using this software. The lack of authentication requirement and remote exploitability make this a significant concern for online retailers using this platform.
Potential Impact
For European organizations using the Campcodes Retro Basketball Shoes Online Store version 1.0, this vulnerability poses a risk of unauthorized data access and manipulation, potentially leading to customer data breaches, financial fraud, and reputational damage. The SQL injection could allow attackers to extract sensitive customer information, including payment details, or alter product and order data, disrupting business operations. This could result in regulatory non-compliance, especially under GDPR, with potential fines and legal consequences. The availability of the online store could also be impacted if attackers delete or corrupt database records, causing downtime and loss of sales. The medium severity rating suggests moderate impact, but the ease of remote exploitation without authentication increases the likelihood of attacks. European e-commerce businesses relying on this platform must consider the threat significant, particularly those handling large volumes of personal and payment data. The exposure of administrative functions increases the risk of broader system compromise, potentially affecting connected systems and supply chains.
Mitigation Recommendations
Organizations should immediately audit their use of Campcodes Retro Basketball Shoes Online Store version 1.0 and restrict access to the /admin/admin_running.php interface to trusted IP addresses or VPNs. Implement input validation and sanitization for the 'pid' parameter, replacing vulnerable code with parameterized queries or prepared statements to prevent SQL injection. If possible, upgrade to a patched version once available or apply vendor-provided fixes. Employ web application firewalls (WAFs) with rules to detect and block SQL injection attempts targeting the vulnerable parameter. Conduct thorough security testing, including automated vulnerability scans and manual code reviews, focusing on all input handling in the admin interface. Monitor logs for suspicious activity related to the 'pid' parameter and unusual database queries. Educate developers on secure coding practices to prevent similar vulnerabilities. Finally, ensure regular backups of databases to enable recovery in case of data corruption or deletion caused by exploitation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
CVE-2025-14529: SQL Injection in Campcodes Retro Basketball Shoes Online Store
Description
A flaw has been found in Campcodes Retro Basketball Shoes Online Store 1.0. The affected element is an unknown function of the file /admin/admin_running.php. This manipulation of the argument pid causes sql injection. It is possible to initiate the attack remotely. The exploit has been published and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-14529 identifies a SQL injection vulnerability in the Campcodes Retro Basketball Shoes Online Store version 1.0, located in the /admin/admin_running.php file. The vulnerability arises from improper sanitization of the 'pid' parameter, which is used in SQL queries without adequate validation or parameterization. An attacker can remotely exploit this flaw without requiring authentication or user interaction, by sending crafted requests that manipulate the SQL query logic. This can lead to unauthorized access to the backend database, allowing attackers to read, modify, or delete sensitive data, potentially affecting confidentiality, integrity, and availability of the system. The CVSS 4.0 score of 6.9 (medium severity) reflects the network attack vector, low complexity, and no required privileges or user interaction, but limited impact scope. No patches or vendor advisories are currently available, and no known exploits have been observed in the wild, though a public exploit has been published, increasing the risk of exploitation. The vulnerability primarily threatens the administrative interface, which may contain sensitive business and customer data. Exploitation could lead to data leakage, unauthorized transactions, or disruption of e-commerce operations. Given the nature of the vulnerability, attackers could automate exploitation attempts, increasing the risk to organizations using this software. The lack of authentication requirement and remote exploitability make this a significant concern for online retailers using this platform.
Potential Impact
For European organizations using the Campcodes Retro Basketball Shoes Online Store version 1.0, this vulnerability poses a risk of unauthorized data access and manipulation, potentially leading to customer data breaches, financial fraud, and reputational damage. The SQL injection could allow attackers to extract sensitive customer information, including payment details, or alter product and order data, disrupting business operations. This could result in regulatory non-compliance, especially under GDPR, with potential fines and legal consequences. The availability of the online store could also be impacted if attackers delete or corrupt database records, causing downtime and loss of sales. The medium severity rating suggests moderate impact, but the ease of remote exploitation without authentication increases the likelihood of attacks. European e-commerce businesses relying on this platform must consider the threat significant, particularly those handling large volumes of personal and payment data. The exposure of administrative functions increases the risk of broader system compromise, potentially affecting connected systems and supply chains.
Mitigation Recommendations
Organizations should immediately audit their use of Campcodes Retro Basketball Shoes Online Store version 1.0 and restrict access to the /admin/admin_running.php interface to trusted IP addresses or VPNs. Implement input validation and sanitization for the 'pid' parameter, replacing vulnerable code with parameterized queries or prepared statements to prevent SQL injection. If possible, upgrade to a patched version once available or apply vendor-provided fixes. Employ web application firewalls (WAFs) with rules to detect and block SQL injection attempts targeting the vulnerable parameter. Conduct thorough security testing, including automated vulnerability scans and manual code reviews, focusing on all input handling in the admin interface. Monitor logs for suspicious activity related to the 'pid' parameter and unusual database queries. Educate developers on secure coding practices to prevent similar vulnerabilities. Finally, ensure regular backups of databases to enable recovery in case of data corruption or deletion caused by exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-11T09:12:46.982Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 693b01b07d4c6f31f7bc5fb7
Added to database: 12/11/2025, 5:38:56 PM
Last enriched: 12/11/2025, 5:54:17 PM
Last updated: 12/12/2025, 4:30:26 AM
Views: 23
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14467: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpjobportal WP Job Portal – AI-Powered Recruitment System for Company or Job Board website
MediumCVE-2025-14393: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in awanhrp Wpik WordPress Basic Ajax Form
MediumCVE-2025-14392: CWE-862 Missing Authorization in darendev Simple Theme Changer
MediumCVE-2025-14391: CWE-352 Cross-Site Request Forgery (CSRF) in darendev Simple Theme Changer
MediumCVE-2025-14354: CWE-352 Cross-Site Request Forgery (CSRF) in doubledome Resource Library for Logged In Users
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.