CVE-2025-13412
📋 TL;DR
Campcodes Retro Basketball Shoes Online Store 1.0 contains a cross-site scripting (XSS) vulnerability in the /admin/admin_running.php file through the product_name parameter. This allows attackers to inject malicious scripts that execute in users' browsers when viewing affected admin pages. The vulnerability affects administrators and potentially other users who access the vulnerable admin interface.
💻 Affected Systems
- Campcodes Retro Basketball Shoes Online Store
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers could steal admin session cookies, perform administrative actions on behalf of legitimate users, deface the admin interface, or redirect users to malicious sites.
Likely Case
Attackers inject malicious JavaScript to steal admin credentials or session tokens, potentially gaining unauthorized access to the admin panel.
If Mitigated
With proper input validation and output encoding, the XSS payloads would be neutralized, preventing script execution.
🎯 Exploit Status
Exploit details are publicly disclosed on GitHub, making it easy for attackers to craft XSS payloads targeting the product_name parameter.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: https://www.campcodes.com/
Restart Required: No
Instructions:
No official patch available. Consider implementing input validation and output encoding in /admin/admin_running.php or upgrading to a patched version if released.
🔧 Temporary Workarounds
Implement Input Validation
allAdd server-side validation to sanitize the product_name parameter, rejecting or encoding special characters.
Edit /admin/admin_running.php to include input sanitization functions like htmlspecialchars() or filter_var() around product_name processing.
Restrict Admin Access
allLimit access to the admin interface to trusted IP addresses or require additional authentication.
Configure web server (e.g., Apache .htaccess or Nginx config) to restrict /admin/ directory access to specific IPs.
🧯 If You Can't Patch
- Disable or remove the /admin/admin_running.php file if not essential.
- Implement a web application firewall (WAF) with XSS protection rules to block malicious requests.
🔍 How to Verify
Check if Vulnerable:
Test by submitting a payload like <script>alert('XSS')</script> in the product_name parameter to /admin/admin_running.php and check if it executes in the browser.
Check Version:
Check the software version in the admin panel or review source code/configuration files for version indicators.
Verify Fix Applied:
After applying fixes, retest with the same XSS payload to ensure it's properly encoded or blocked.
📡 Detection & Monitoring
Log Indicators:
- HTTP requests to /admin/admin_running.php with suspicious strings like <script>, javascript:, or encoded payloads in parameters.
Network Indicators:
- Unusual traffic patterns to admin endpoints, especially with long or encoded parameter values.
SIEM Query:
source="web_logs" AND uri_path="/admin/admin_running.php" AND (param="product_name" AND value MATCHES "(?i)<script|javascript:")