EUVD-2025-18713

| CVE-2025-6303 HIGH
2025-06-20 [email protected]
7.3
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low

Lifecycle Timeline

4
Analysis Generated
Mar 15, 2026 - 00:19 vuln.today
EUVD ID Assigned
Mar 15, 2026 - 00:19 euvd
EUVD-2025-18713
PoC Detected
Jun 26, 2025 - 21:19 vuln.today
Public exploit code
CVE Published
Jun 20, 2025 - 03:15 nvd
HIGH 7.3

Description

A vulnerability has been found in code-projects Online Shoe Store 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /contactus1.php. The manipulation of the argument Message leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

Analysis

CVE-2025-6303 is a critical SQL injection vulnerability in code-projects Online Shoe Store version 1.0, specifically in the /contactus1.php file's Message parameter. An unauthenticated remote attacker can exploit this to execute arbitrary SQL queries, potentially leading to unauthorized data access, modification, or deletion. The vulnerability has been publicly disclosed with exploit code available, making active exploitation likely.

Technical Context

This vulnerability represents a classic SQL injection flaw (CWE-74: Improper Neutralization of Special Elements used in an SQL Command) where user-supplied input from the 'Message' parameter in /contactus1.php is not properly sanitized before being incorporated into SQL queries. The affected product is code-projects Online Shoe Store 1.0, an e-commerce application likely built with PHP and a relational database backend (MySQL/MariaDB/PostgreSQL). The root cause is insufficient input validation and lack of parameterized queries or prepared statements. The attacker can manipulate the Message POST/GET parameter to break out of the intended SQL context and inject malicious SQL commands. CWE-74 categorizes this as improper neutralization of special elements, indicating the application fails to escape or validate metacharacters that have special meaning in SQL syntax.

Affected Products

code-projects Online Shoe Store, Version 1.0 (all installations). No patched version information is available in the provided data, suggesting this product may be abandoned or the vendor has not released updates. Presumed CPE: cpe:2.3:a:code-projects:online_shoe_store:1.0:*:*:*:*:*:*:* (vendor and product identifiers inferred from description). The vulnerability affects the /contactus1.php endpoint, indicating this is a server-side PHP application. No vendor advisory links are provided in the source data.

Remediation

Immediate actions: (1) Disable or restrict access to /contactus1.php if the contact form is non-critical; (2) Implement Web Application Firewall (WAF) rules to block SQL injection payloads in the Message parameter (pattern matching for SQL keywords: UNION, SELECT, INSERT, DROP, etc.); (3) Apply rate limiting and IP-based restrictions to the contact endpoint. Medium-term remediation: (1) Contact code-projects for security updates or patch availability—if no patches are forthcoming, plan application replacement; (2) Implement input validation: use allowlists for Message content, restrict to alphanumeric characters and basic punctuation, enforce maximum length limits; (3) Refactor /contactus1.php to use parameterized SQL queries (prepared statements) with bound parameters instead of string concatenation; (4) Apply principle of least privilege to database credentials used by the web application. Long-term: Migrate to a maintained e-commerce platform with modern security practices.

Priority Score

57
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +36
POC: +20

Share

EUVD-2025-18713 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy