CVE-2025-52920

6.4 MEDIUM

📋 TL;DR

Innoshop versions through 0.4.1 contain multiple Insecure Direct Object Reference (IDOR) vulnerabilities in the frontend shop. Attackers with customer accounts can access other customers' order details, shipping/billing information, and delete their product reviews. All Innoshop deployments using vulnerable versions are affected.

💻 Affected Systems

Products:
  • Innoshop
Versions: through 0.4.1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable. The vulnerability exists in multiple endpoints within the frontend shop.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Mass exposure of customer PII including addresses and billing information, deletion of all product reviews, and potential regulatory compliance violations.

🟠

Likely Case

Targeted exposure of specific customers' personal information and deletion of reviews, leading to privacy violations and loss of review content.

🟢

If Mitigated

Limited impact with proper access controls preventing unauthorized object reference.

🌐 Internet-Facing: HIGH - The vulnerability is in the frontend shop accessible to anyone who can create a customer account.
🏢 Internal Only: LOW - The vulnerability requires frontend access, making internal-only deployments less exposed.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires creating a customer account first, then manipulating object IDs in URLs and parameters. Detailed exploitation methods are publicly documented.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None known

Restart Required: No

Instructions:

Check the Innoshop GitHub repository for updates. If a patch is released, update to the fixed version following standard software update procedures.

🔧 Temporary Workarounds

Implement Access Control Checks

all

Add server-side authorization checks to verify users can only access their own orders, addresses, and reviews.

Use Indirect Object References

all

Replace direct object references with indirect references or tokens that cannot be easily enumerated.

🧯 If You Can't Patch

  • Implement a web application firewall (WAF) with rules to detect and block IDOR patterns in URLs and parameters.
  • Monitor application logs for suspicious access patterns to order, address, and review endpoints.

🔍 How to Verify

Check if Vulnerable:

Test if you can access /en/account/orders/[other_user_order_id] or manipulate shipping_address_id/billing_address_id parameters while logged in as a different user.

Check Version:

Check the Innoshop version in your deployment configuration or admin panel.

Verify Fix Applied:

Verify that access control checks prevent viewing other users' orders, addresses, and reviews after implementing fixes.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed attempts to access other users' order IDs
  • DELETE requests to /en/account/reviews/ with non-user review IDs
  • Unusual parameter manipulation in order creation

Network Indicators:

  • Patterns of sequential ID enumeration in URLs
  • Unusual DELETE request patterns to review endpoints

SIEM Query:

source="web_logs" AND (url_path="/en/account/orders/*" OR url_path="/en/account/reviews/*") AND user_id!=resource_owner_id

🔗 References

📤 Share & Export