CVE-2025-11070

7.3 HIGH

📋 TL;DR

Projectworlds Online Shopping System 1.0 contains a SQL injection vulnerability in the /store/cart_add.php file that allows remote attackers to execute arbitrary SQL commands by manipulating the ID parameter. This affects all deployments of version 1.0 of this e-commerce software. Attackers can potentially access, modify, or delete database contents.

💻 Affected Systems

Products:
  • Projectworlds Online Shopping System
Versions: 1.0
Operating Systems: All operating systems running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of version 1.0 are vulnerable. The vulnerability exists in the default installation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including theft of customer data, administrative credentials, payment information, and potential remote code execution on the database server.

🟠

Likely Case

Data exfiltration of customer information, product data, and administrative credentials leading to further system compromise.

🟢

If Mitigated

Limited information disclosure if proper input validation and parameterized queries are implemented.

🌐 Internet-Facing: HIGH - The vulnerability is remotely exploitable and affects web-facing e-commerce systems.
🏢 Internal Only: MEDIUM - Internal systems could still be vulnerable to insider threats or lateral movement.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The exploit is publicly available and requires minimal technical skill to execute.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Consider migrating to a supported e-commerce platform or implementing custom fixes with parameterized queries.

🔧 Temporary Workarounds

Input Validation Filter

all

Add input validation to sanitize the ID parameter before processing

Modify /store/cart_add.php to validate that ID parameter contains only numeric characters

WAF Rule Implementation

all

Deploy web application firewall rules to block SQL injection patterns

Add WAF rule to block requests containing SQL keywords in the ID parameter

🧯 If You Can't Patch

  • Isolate the vulnerable system behind a reverse proxy with strict input validation
  • Implement network segmentation to limit database access from the web server

🔍 How to Verify

Check if Vulnerable:

Test the /store/cart_add.php endpoint with SQL injection payloads in the ID parameter (e.g., ID=1' OR '1'='1)

Check Version:

Check the software version in the admin panel or configuration files

Verify Fix Applied:

Test with the same payloads and verify they are rejected or properly sanitized

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL errors in application logs
  • Multiple failed login attempts following SQL injection patterns
  • Unexpected database queries from web server IP

Network Indicators:

  • HTTP requests to /store/cart_add.php with SQL keywords in parameters
  • Unusual database traffic patterns from web server

SIEM Query:

source="web_logs" AND uri="/store/cart_add.php" AND (param="ID" AND value MATCHES "(?i)(union|select|insert|update|delete|drop|--|#|;)")

🔗 References

📤 Share & Export