CVE-2025-6343

7.3 HIGH

📋 TL;DR

A critical SQL injection vulnerability exists in code-projects Online Shoe Store 1.0, specifically in the /admin/admin_product.php file's pid parameter. This allows remote attackers to execute arbitrary SQL commands on the database. All installations of Online Shoe Store 1.0 with the vulnerable admin interface exposed are affected.

💻 Affected Systems

Products:
  • code-projects Online Shoe Store
Versions: 1.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires admin interface to be accessible. The vulnerability is in the default installation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including data theft, data manipulation, and potential remote code execution via database functions.

🟠

Likely Case

Unauthorized access to sensitive data (customer information, orders, admin credentials), database manipulation, and potential website defacement.

🟢

If Mitigated

Limited impact if proper input validation and parameterized queries are implemented, with database permissions restricted.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit details are publicly available. Attack requires access to the admin interface but not necessarily authentication if admin panel is improperly secured.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://code-projects.org/

Restart Required: No

Instructions:

1. Check vendor website for updates. 2. If no patch available, implement workarounds. 3. Consider migrating to a supported e-commerce platform.

🔧 Temporary Workarounds

Input Validation and Sanitization

all

Add server-side validation to sanitize the pid parameter in admin_product.php

Edit /admin/admin_product.php to implement parameterized queries or proper input filtering

Web Application Firewall (WAF)

all

Deploy WAF rules to block SQL injection patterns targeting the pid parameter

🧯 If You Can't Patch

  • Restrict access to /admin/ directory to trusted IP addresses only
  • Disable or remove the admin_product.php file if not needed

🔍 How to Verify

Check if Vulnerable:

Test the /admin/admin_product.php endpoint with SQL injection payloads in the pid parameter (e.g., pid=1' OR '1'='1)

Check Version:

Check the software version in the application's configuration files or admin panel

Verify Fix Applied:

Verify that SQL injection payloads no longer execute and return appropriate error messages or are blocked

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed login attempts to admin panel followed by SQL errors
  • Requests to /admin/admin_product.php with suspicious pid parameters

Network Indicators:

  • HTTP requests containing SQL keywords (SELECT, UNION, etc.) in pid parameter
  • Unusual traffic patterns to admin interface

SIEM Query:

source="web_logs" AND uri="/admin/admin_product.php" AND (query="*pid=*SELECT*" OR query="*pid=*UNION*")

🔗 References

📤 Share & Export