Skip to main content

CVE-2025-3975: Information Disclosure in ScriptAndTools eCommerce-website-in-PHP

Medium
VulnerabilityCVE-2025-3975cvecve-2025-3975
Published: Sun Apr 27 2025 (04/27/2025, 15:31:05 UTC)
Source: CVE
Vendor/Project: ScriptAndTools
Product: eCommerce-website-in-PHP

Description

A vulnerability was found in ScriptAndTools eCommerce-website-in-PHP 3.0 and classified as problematic. This issue affects some unknown processing of the file /admin/subscriber-csv.php. The manipulation leads to information disclosure. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 06/24/2025, 18:22:07 UTC

Technical Analysis

CVE-2025-3975 is an information disclosure vulnerability identified in version 3.0 of the ScriptAndTools eCommerce-website-in-PHP product. The vulnerability specifically involves improper handling within the /admin/subscriber-csv.php file, which is part of the administrative backend functionality. This flaw allows an unauthenticated remote attacker to manipulate requests to this PHP script, resulting in unauthorized disclosure of sensitive information. The vulnerability does not require any authentication or user interaction, and the attack vector is network-based, making exploitation feasible remotely with low complexity. The disclosed information could include subscriber data or other sensitive administrative information processed or stored by the vulnerable script. The CVSS 4.0 base score is 6.9, categorizing the severity as medium. The vulnerability does not impact integrity or availability but compromises confidentiality to a limited extent. No patches or official remediation links have been published at the time of disclosure, and there are no known exploits actively used in the wild, although public disclosure of the exploit code exists, increasing the risk of exploitation attempts.

Potential Impact

For European organizations using ScriptAndTools eCommerce-website-in-PHP version 3.0, this vulnerability poses a moderate risk primarily to the confidentiality of subscriber or customer data managed through the administrative interface. Information disclosure could lead to privacy violations, regulatory non-compliance (e.g., GDPR), and potential reputational damage. Since the vulnerability is remotely exploitable without authentication, attackers could leverage it to gather sensitive business or customer information, which might be used for further targeted attacks such as phishing or social engineering. The impact is particularly significant for eCommerce businesses handling personal data of EU citizens, as unauthorized data exposure could trigger legal penalties under European data protection laws. However, the vulnerability does not directly affect system integrity or availability, so operational disruption is unlikely. The absence of known active exploitation reduces immediate risk but does not eliminate the threat, especially given the public availability of exploit details.

Mitigation Recommendations

1. Immediate mitigation should involve restricting access to the /admin/subscriber-csv.php script by implementing network-level controls such as IP whitelisting or VPN-only access to the administrative interface. 2. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting this script. 3. Conduct a thorough code review of the /admin/subscriber-csv.php file to identify and fix improper input validation or output encoding issues that lead to information leakage. 4. If possible, disable or remove the subscriber CSV export functionality until a vendor patch is available. 5. Monitor web server logs for unusual access patterns or repeated requests to the vulnerable script indicative of exploitation attempts. 6. Engage with the vendor or community to obtain or develop patches addressing the vulnerability. 7. Ensure that all sensitive data stored or processed by the eCommerce platform is encrypted at rest and in transit to minimize the impact of any potential disclosure. 8. Implement strict role-based access controls (RBAC) and multi-factor authentication (MFA) for administrative accounts to reduce the attack surface.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-04-26T07:25:37.140Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682d983ec4522896dcbef952

Added to database: 5/21/2025, 9:09:18 AM

Last enriched: 6/24/2025, 6:22:07 PM

Last updated: 8/16/2025, 12:37:29 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats