CVE-2025-12919

3.7 LOW

📋 TL;DR

This vulnerability in EverShop allows attackers to manipulate order UUID parameters to access unauthorized order data. It affects EverShop installations up to version 2.0.1. The attack can be performed remotely but requires high complexity to exploit.

💻 Affected Systems

Products:
  • EverShop
Versions: up to 2.0.1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the Order Handler component via GraphQL resolvers

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Unauthorized access to sensitive order information including customer data, payment details, and order history.

🟠

Likely Case

Information disclosure of order data that should be restricted to authorized users only.

🟢

If Mitigated

Minimal impact with proper access controls and input validation in place.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Exploit is public but requires specific knowledge of GraphQL and UUID manipulation

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Consider upgrading if vendor releases fix or implement workarounds.

🔧 Temporary Workarounds

Input Validation for UUID Parameters

all

Add strict validation for UUID parameters in Order resolvers to prevent unauthorized access

Modify /src/modules/oms/graphql/types/Order/Order.resolvers.js to validate UUID against authorized user permissions

Access Control Enhancement

all

Implement additional authorization checks before processing order requests

Add middleware or resolver-level checks to verify user has permission to access specific order UUIDs

🧯 If You Can't Patch

  • Implement WAF rules to detect and block suspicious UUID manipulation attempts
  • Monitor GraphQL queries for unusual order access patterns and implement rate limiting

🔍 How to Verify

Check if Vulnerable:

Check if EverShop version is 2.0.1 or earlier and review Order.resolvers.js for proper UUID validation

Check Version:

Check package.json or application configuration for EverShop version

Verify Fix Applied:

Test that unauthorized users cannot access order data by manipulating UUID parameters

📡 Detection & Monitoring

Log Indicators:

  • Unusual GraphQL queries targeting order endpoints with manipulated UUIDs
  • Multiple failed order access attempts

Network Indicators:

  • Suspicious patterns in GraphQL API requests to order endpoints

SIEM Query:

source="application_logs" AND (message CONTAINS "Order.resolvers" OR message CONTAINS "unauthorized order access")

🔗 References

📤 Share & Export