Skip to main content

CVE-2025-6316: SQL Injection in code-projects Online Shoe Store

Medium
VulnerabilityCVE-2025-6316cvecve-2025-6316
Published: Fri Jun 20 2025 (06/20/2025, 07:00:14 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Online Shoe Store

Description

A vulnerability was found in code-projects Online Shoe Store 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/admin_running.php. The manipulation of the argument qty leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 06/20/2025, 07:31:54 UTC

Technical Analysis

CVE-2025-6316 is a SQL Injection vulnerability identified in version 1.0 of the code-projects Online Shoe Store application, specifically within the /admin/admin_running.php file. The vulnerability arises from improper sanitization or validation of the 'qty' parameter, which is used in SQL queries. An attacker can remotely manipulate this parameter to inject malicious SQL code, potentially altering the database queries executed by the application. This can lead to unauthorized data access, data modification, or even complete compromise of the underlying database. The vulnerability does not require any authentication or user interaction, making it exploitable by unauthenticated remote attackers. The CVSS 4.0 base score is 6.9, indicating a medium severity level, with an attack vector classified as network (remote), low attack complexity, no privileges required, and no user interaction needed. The impact on confidentiality, integrity, and availability is rated as low individually but combined can lead to significant risks depending on the database content and application context. There is no public exploit known in the wild yet, but the exploit details have been disclosed publicly, increasing the risk of exploitation. The vulnerability affects only version 1.0 of the product, and no official patches or mitigations have been published at this time.

Potential Impact

For European organizations using the code-projects Online Shoe Store 1.0, this vulnerability poses a significant risk to the confidentiality and integrity of their customer and transactional data. Exploitation could allow attackers to extract sensitive information such as customer details, order histories, or payment information, potentially leading to data breaches and regulatory non-compliance under GDPR. Additionally, attackers could manipulate order quantities or other business-critical data, disrupting operations and causing financial losses. The vulnerability's remote exploitability without authentication increases the risk of automated attacks and widespread exploitation. Given the public disclosure of the exploit, organizations face an elevated threat level. Retailers and e-commerce platforms in Europe relying on this software or similar vulnerable components should be particularly vigilant, as successful exploitation could damage brand reputation and customer trust.

Mitigation Recommendations

Organizations should immediately audit their deployments of code-projects Online Shoe Store to identify any instances of version 1.0. Since no official patch is currently available, temporary mitigations include implementing Web Application Firewall (WAF) rules specifically designed to detect and block SQL injection attempts targeting the 'qty' parameter in /admin/admin_running.php. Input validation and sanitization should be enforced at the application level, rejecting or properly escaping any suspicious input. Restricting access to the /admin/ directory via IP whitelisting or VPN-only access can reduce exposure. Monitoring database logs for unusual queries and application logs for suspicious activity is recommended to detect potential exploitation attempts. Organizations should also plan for an upgrade or replacement of the vulnerable software once a patch or newer secure version is released. Regular backups of the database and application data should be maintained to enable recovery in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-06-19T09:56:24.899Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68550ae57ff74dad36a1be9a

Added to database: 6/20/2025, 7:16:53 AM

Last enriched: 6/20/2025, 7:31:54 AM

Last updated: 8/18/2025, 11:34:54 PM

Views: 27

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats