CVE-2025-6307

| EUVD-2025-18722 HIGH
2025-06-20 [email protected]
7.3
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low

Lifecycle Timeline

4
Analysis Generated
Mar 15, 2026 - 00:19 vuln.today
EUVD ID Assigned
Mar 15, 2026 - 00:19 euvd
EUVD-2025-18722
PoC Detected
Jun 26, 2025 - 21:18 vuln.today
Public exploit code
CVE Published
Jun 20, 2025 - 05:15 nvd
HIGH 7.3

Description

A vulnerability was found in code-projects Online Shoe Store 1.0. It has been rated as critical. This issue affects some unknown processing of the file /function/edit_customer.php. The manipulation of the argument firstname leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.

Analysis

CVE-2025-6307 is a critical SQL injection vulnerability in code-projects Online Shoe Store 1.0 affecting the /function/edit_customer.php file, where the 'firstname' parameter is insufficiently sanitized, allowing remote unauthenticated attackers to execute arbitrary SQL queries. The vulnerability has been publicly disclosed with proof-of-concept details available, and while rated 7.3 (High) in CVSS v3.1, the network-accessible attack vector combined with no authentication requirement and demonstrated public exploitation significantly elevates real-world risk. Other parameters in the same function are suspected to be vulnerable to the same injection pattern.

Technical Context

This vulnerability stems from CWE-74 (Improper Neutralization of Special Elements in Output Used by a Downstream Component - 'Injection'), specifically manifesting as SQL injection in a PHP web application. The affected endpoint /function/edit_customer.php processes user-supplied input from the 'firstname' parameter without proper parameterized queries, prepared statements, or input validation, allowing attackers to inject malicious SQL syntax directly into database queries. The Online Shoe Store application (CPE: cpe:2.3:a:code-projects:online_shoe_store:1.0:*:*:*:*:*:*:*) is a PHP-based e-commerce platform where customer data modification functionality has been inadequately protected against injection attacks. The vulnerability likely affects other customer attribute parameters (lastname, email, phone, etc.) that follow similar unsafe coding patterns within the same file.

Affected Products

Online Shoe Store (['1.0'])

Remediation

Immediate Mitigation: Disable or restrict access to /function/edit_customer.php until patching is available using web application firewall (WAF) rules or web server configuration Code-Level Patch: Replace all SQL query construction in edit_customer.php with parameterized prepared statements using PHP PDO or mysqli prepared statements: use placeholders (?) or named parameters instead of string concatenation Input Validation: Implement strict whitelist validation for the firstname parameter: allow only alphanumeric characters, hyphens, apostrophes, and spaces; enforce length limits (max 50 characters) Defense in Depth: Apply principle of least privilege to database user account: restrict permissions to only SELECT, UPDATE operations needed for customer editing, remove DROP/ALTER/EXEC permissions Upgrade Path: Contact code-projects vendor for patch or security update; if unavailable, consider migration to alternative e-commerce platforms with active security support Detection: Implement Web Application Firewall rules to detect and block SQL injection patterns in edit_customer.php requests; monitor database query logs for unusual SQL syntax

Priority Score

57
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +36
POC: +20

Share

CVE-2025-6307 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy