CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Lifecycle Timeline
4Description
A vulnerability has been found in code-projects Simple Shopping Cart 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /register.php. The manipulation of the argument ruser_email leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Analysis
CVE-2025-7609 is a critical SQL injection vulnerability in code-projects Simple Shopping Cart 1.0 affecting the /register.php endpoint via the ruser_email parameter. An unauthenticated remote attacker can exploit this to read, modify, or delete database contents, potentially compromising user data and application integrity. Public exploit code exists, increasing real-world exploitation risk.
Technical Context
The vulnerability is a classic SQL injection flaw (CWE-74: Improper Neutralization of Special Elements used in an Output Command) in PHP-based web application code. The /register.php file fails to properly sanitize or parameterize SQL queries using user-supplied input from the ruser_email POST/GET parameter. Rather than using prepared statements with bound parameters, the application concatenates user input directly into SQL queries. Simple Shopping Cart 1.0 is a lightweight PHP e-commerce framework typically deployed on Apache/Nginx with MySQL/MariaDB backends. The lack of input validation and parameterized query usage represents a fundamental secure coding failure in the registration workflow.
Affected Products
code-projects Simple Shopping Cart version 1.0 and potentially earlier versions. CPE would be: cpe:2.3:a:code-projects:simple_shopping_cart:1.0:*:*:*:*:php:*:*. The vulnerability specifically impacts installations where user registration is enabled and the ruser_email parameter is processed by /register.php. No vendor advisory links or alternative version numbers were provided; however, versions post-1.0 may also be affected if the /register.php SQL injection was not patched in minor/patch releases.
Remediation
Immediate actions: (1) Upgrade Simple Shopping Cart to a patched version if available from the code-projects repository (verify with vendor); (2) If no patch exists, apply input validation: use prepared statements with parameterized queries for all SQL operations, specifically in /register.php for the ruser_email parameter; (3) Implement parameterized queries using MySQLi prepared statements or PDO with bound parameters instead of string concatenation; (4) Add input validation: enforce email format validation using filter_var($email, FILTER_VALIDATE_EMAIL) before database operations; (5) Apply principle of least privilege to database user credentials (restrict SQL injection impact); (6) Consider Web Application Firewall (WAF) rules to detect SQL injection patterns in the ruser_email parameter as a temporary layer. Long-term: migrate to a maintained e-commerce platform with modern secure coding practices.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-21354