CVE-2025-13423
📋 TL;DR
This vulnerability allows remote attackers to upload arbitrary files to Campcodes Retro Basketball Shoes Online Store 1.0 via the product_image parameter in /admin/admin_product.php. This affects all installations of the software with the vulnerable component exposed. Attackers can potentially upload malicious files to compromise the system.
💻 Affected Systems
- Campcodes Retro Basketball Shoes Online Store
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete system compromise, data theft, or ransomware deployment.
Likely Case
Unauthorized file upload allowing defacement, malware hosting, or limited server access.
If Mitigated
File upload blocked or restricted to safe types only.
🎯 Exploit Status
Exploit details published on GitHub; requires admin authentication.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: https://www.campcodes.com/
Restart Required: No
Instructions:
No official patch available. Check vendor website for updates.
🔧 Temporary Workarounds
Restrict File Uploads
allImplement server-side validation to allow only specific file types (e.g., .jpg, .png) and block executable files.
Secure Admin Directory
allRestrict access to /admin/ directory using web server authentication or IP whitelisting.
🧯 If You Can't Patch
- Disable or remove the /admin/admin_product.php file if not needed.
- Implement a Web Application Firewall (WAF) to block malicious upload attempts.
🔍 How to Verify
Check if Vulnerable:
Attempt to upload a non-image file via the product_image parameter in /admin/admin_product.php and check if it's accepted.
Check Version:
Check software version in admin panel or configuration files.
Verify Fix Applied:
Test file upload with restricted types; only allowed extensions should succeed.
📡 Detection & Monitoring
Log Indicators:
- Unusual file uploads to /admin/admin_product.php
- Uploads of non-image file types
Network Indicators:
- HTTP POST requests to /admin/admin_product.php with file uploads
SIEM Query:
source="web_logs" AND uri="/admin/admin_product.php" AND method="POST" AND file_upload="true"