CVE-2025-3975: Information Disclosure in ScriptAndTools eCommerce-website-in-PHP
A vulnerability was found in ScriptAndTools eCommerce-website-in-PHP 3.0 and classified as problematic. This issue affects some unknown processing of the file /admin/subscriber-csv.php. The manipulation leads to information disclosure. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-3975 is an information disclosure vulnerability identified in version 3.0 of the ScriptAndTools eCommerce-website-in-PHP product. The vulnerability specifically involves improper handling within the /admin/subscriber-csv.php file, which is part of the administrative backend functionality. This flaw allows an unauthenticated remote attacker to manipulate requests to this PHP script, resulting in unauthorized disclosure of sensitive information. The vulnerability does not require any authentication or user interaction, and the attack vector is network-based, making exploitation feasible remotely with low complexity. The disclosed information could include subscriber data or other sensitive administrative information processed or stored by the vulnerable script. The CVSS 4.0 base score is 6.9, categorizing the severity as medium. The vulnerability does not impact integrity or availability but compromises confidentiality to a limited extent. No patches or official remediation links have been published at the time of disclosure, and there are no known exploits actively used in the wild, although public disclosure of the exploit code exists, increasing the risk of exploitation attempts.
Potential Impact
For European organizations using ScriptAndTools eCommerce-website-in-PHP version 3.0, this vulnerability poses a moderate risk primarily to the confidentiality of subscriber or customer data managed through the administrative interface. Information disclosure could lead to privacy violations, regulatory non-compliance (e.g., GDPR), and potential reputational damage. Since the vulnerability is remotely exploitable without authentication, attackers could leverage it to gather sensitive business or customer information, which might be used for further targeted attacks such as phishing or social engineering. The impact is particularly significant for eCommerce businesses handling personal data of EU citizens, as unauthorized data exposure could trigger legal penalties under European data protection laws. However, the vulnerability does not directly affect system integrity or availability, so operational disruption is unlikely. The absence of known active exploitation reduces immediate risk but does not eliminate the threat, especially given the public availability of exploit details.
Mitigation Recommendations
1. Immediate mitigation should involve restricting access to the /admin/subscriber-csv.php script by implementing network-level controls such as IP whitelisting or VPN-only access to the administrative interface. 2. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting this script. 3. Conduct a thorough code review of the /admin/subscriber-csv.php file to identify and fix improper input validation or output encoding issues that lead to information leakage. 4. If possible, disable or remove the subscriber CSV export functionality until a vendor patch is available. 5. Monitor web server logs for unusual access patterns or repeated requests to the vulnerable script indicative of exploitation attempts. 6. Engage with the vendor or community to obtain or develop patches addressing the vulnerability. 7. Ensure that all sensitive data stored or processed by the eCommerce platform is encrypted at rest and in transit to minimize the impact of any potential disclosure. 8. Implement strict role-based access controls (RBAC) and multi-factor authentication (MFA) for administrative accounts to reduce the attack surface.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-3975: Information Disclosure in ScriptAndTools eCommerce-website-in-PHP
Description
A vulnerability was found in ScriptAndTools eCommerce-website-in-PHP 3.0 and classified as problematic. This issue affects some unknown processing of the file /admin/subscriber-csv.php. The manipulation leads to information disclosure. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-3975 is an information disclosure vulnerability identified in version 3.0 of the ScriptAndTools eCommerce-website-in-PHP product. The vulnerability specifically involves improper handling within the /admin/subscriber-csv.php file, which is part of the administrative backend functionality. This flaw allows an unauthenticated remote attacker to manipulate requests to this PHP script, resulting in unauthorized disclosure of sensitive information. The vulnerability does not require any authentication or user interaction, and the attack vector is network-based, making exploitation feasible remotely with low complexity. The disclosed information could include subscriber data or other sensitive administrative information processed or stored by the vulnerable script. The CVSS 4.0 base score is 6.9, categorizing the severity as medium. The vulnerability does not impact integrity or availability but compromises confidentiality to a limited extent. No patches or official remediation links have been published at the time of disclosure, and there are no known exploits actively used in the wild, although public disclosure of the exploit code exists, increasing the risk of exploitation attempts.
Potential Impact
For European organizations using ScriptAndTools eCommerce-website-in-PHP version 3.0, this vulnerability poses a moderate risk primarily to the confidentiality of subscriber or customer data managed through the administrative interface. Information disclosure could lead to privacy violations, regulatory non-compliance (e.g., GDPR), and potential reputational damage. Since the vulnerability is remotely exploitable without authentication, attackers could leverage it to gather sensitive business or customer information, which might be used for further targeted attacks such as phishing or social engineering. The impact is particularly significant for eCommerce businesses handling personal data of EU citizens, as unauthorized data exposure could trigger legal penalties under European data protection laws. However, the vulnerability does not directly affect system integrity or availability, so operational disruption is unlikely. The absence of known active exploitation reduces immediate risk but does not eliminate the threat, especially given the public availability of exploit details.
Mitigation Recommendations
1. Immediate mitigation should involve restricting access to the /admin/subscriber-csv.php script by implementing network-level controls such as IP whitelisting or VPN-only access to the administrative interface. 2. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting this script. 3. Conduct a thorough code review of the /admin/subscriber-csv.php file to identify and fix improper input validation or output encoding issues that lead to information leakage. 4. If possible, disable or remove the subscriber CSV export functionality until a vendor patch is available. 5. Monitor web server logs for unusual access patterns or repeated requests to the vulnerable script indicative of exploitation attempts. 6. Engage with the vendor or community to obtain or develop patches addressing the vulnerability. 7. Ensure that all sensitive data stored or processed by the eCommerce platform is encrypted at rest and in transit to minimize the impact of any potential disclosure. 8. Implement strict role-based access controls (RBAC) and multi-factor authentication (MFA) for administrative accounts to reduce the attack surface.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-04-26T07:25:37.140Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682d983ec4522896dcbef952
Added to database: 5/21/2025, 9:09:18 AM
Last enriched: 6/24/2025, 6:22:07 PM
Last updated: 10/15/2025, 9:13:05 AM
Views: 26
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-9967: CWE-288 Authentication Bypass Using an Alternate Path or Channel in gsayed786 Orion SMS OTP Verification
CriticalCVE-2025-11728: CWE-306 Missing Authentication for Critical Function in oceanpayment Oceanpayment CreditCard Gateway
MediumCVE-2025-11722: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in ikhodal Woocommerce Category and Products Accordion Panel
HighCVE-2025-11701: CWE-862 Missing Authorization in quicoto Zip Attachments
MediumCVE-2025-11692: CWE-862 Missing Authorization in quicoto Zip Attachments
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.