Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-56162: n/a

0
Medium
VulnerabilityCVE-2025-56162cvecve-2025-56162
Published: Thu Oct 02 2025 (10/02/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

YOSHOP 2.0 suffers from an unauthenticated SQL injection in the goodsIds parameter of the /api/goods/listByIds endpoint. The getListByIds function concatenates user input into orderRaw('field(goods_id, ...)'), allowing attackers to: (a) enumerate or modify database data, including dumping admin password hashes; (b) write web-shell files or invoke xp_cmdshell, leading to remote code execution on servers configured with sufficient DB privileges.

AI-Powered Analysis

AILast updated: 10/02/2025, 15:56:58 UTC

Technical Analysis

CVE-2025-56162 is a critical unauthenticated SQL injection vulnerability found in YOSHOP 2.0, specifically in the goodsIds parameter of the /api/goods/listByIds endpoint. The vulnerability arises because the getListByIds function improperly concatenates user-supplied input directly into an SQL ORDER BY clause using orderRaw('field(goods_id, ...)'), without proper sanitization or parameterization. This flaw allows attackers to inject arbitrary SQL commands. Exploitation can lead to several severe consequences: (a) attackers can enumerate or modify database contents, including extracting sensitive data such as administrator password hashes; (b) if the underlying database server has sufficient privileges, attackers can write web shell files or invoke dangerous stored procedures like xp_cmdshell, enabling remote code execution (RCE) on the hosting server. The vulnerability does not require authentication, significantly increasing its risk profile. Although no CVSS score has been assigned yet, the ability to execute arbitrary SQL commands and potentially achieve RCE makes this a highly critical threat. No patches or mitigations have been officially published at the time of analysis, and no known exploits are reported in the wild yet. However, the technical details indicate a severe risk to confidentiality, integrity, and availability of affected systems.

Potential Impact

For European organizations using YOSHOP 2.0, this vulnerability poses a substantial risk. Successful exploitation could lead to unauthorized access to sensitive customer and administrative data, including password hashes, potentially resulting in credential compromise and lateral movement within networks. The possibility of remote code execution elevates the threat to full system compromise, allowing attackers to deploy web shells, manipulate data, disrupt services, or use the compromised infrastructure for further attacks. This can lead to significant operational disruptions, data breaches subject to GDPR penalties, reputational damage, and financial losses. Organizations in sectors with high regulatory requirements or handling sensitive personal data are particularly at risk. The unauthenticated nature of the vulnerability means attackers can exploit it remotely without prior access, increasing the likelihood of targeted or opportunistic attacks against European e-commerce platforms running YOSHOP 2.0.

Mitigation Recommendations

Given the absence of official patches, European organizations should immediately implement the following mitigations: 1) Apply strict input validation and sanitization on the goodsIds parameter to prevent injection of malicious SQL code. 2) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting the /api/goods/listByIds endpoint. 3) Restrict database user privileges to the minimum necessary, ensuring the database account used by YOSHOP cannot execute xp_cmdshell or write files to the web root. 4) Monitor logs for unusual database queries or attempts to access the vulnerable endpoint. 5) Consider temporarily disabling or restricting access to the affected API endpoint until a patch is available. 6) Conduct thorough security assessments and penetration tests focusing on SQL injection vectors in YOSHOP deployments. 7) Stay updated with vendor advisories for official patches or updates addressing this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-08-16T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68de9f650cc3618ea8d681b4

Added to database: 10/2/2025, 3:51:01 PM

Last enriched: 10/2/2025, 3:56:58 PM

Last updated: 10/7/2025, 1:19:07 PM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats