EUVD-2025-18716

| CVE-2025-6306 HIGH
2025-06-20 [email protected]
7.3
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low

Lifecycle Timeline

4
Analysis Generated
Mar 15, 2026 - 00:19 vuln.today
EUVD ID Assigned
Mar 15, 2026 - 00:19 euvd
EUVD-2025-18716
PoC Detected
Jun 26, 2025 - 21:18 vuln.today
Public exploit code
CVE Published
Jun 20, 2025 - 04:15 nvd
HIGH 7.3

Description

A vulnerability was found in code-projects Online Shoe Store 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /admin/admin_index.php. The manipulation of the argument Username leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

Analysis

CVE-2025-6306 is a critical SQL injection vulnerability in code-projects Online Shoe Store version 1.0, affecting the admin authentication mechanism in /admin/admin_index.php. An unauthenticated remote attacker can manipulate the Username parameter to execute arbitrary SQL queries, potentially leading to unauthorized access, data theft, or data manipulation. The vulnerability has been publicly disclosed with working exploits available, making active exploitation likely.

Technical Context

The vulnerability stems from CWE-74 (Improper Neutralization of Special Elements in Output Used by a Downstream Component - 'Injection'), specifically SQL injection in the authentication layer. The /admin/admin_index.php file fails to properly sanitize or parameterize user-supplied input in the Username parameter before incorporating it into SQL queries. This is a classic first-order SQL injection vulnerability where attacker-controlled data is directly concatenated into dynamic SQL statements without prepared statements, input validation, or escaping. The root cause is improper input handling in server-side code that constructs database queries, allowing attackers to break out of the intended SQL syntax and execute arbitrary commands.

Affected Products

code-projects Online Shoe Store version 1.0 - all installations. CPE string would be: cpe:2.3:a:code-projects:online_shoe_store:1.0:*:*:*:*:*:*:*. The vulnerability specifically affects the admin portal authentication component at /admin/admin_index.php. No evidence of version 2.0 or later being released suggests this project may be unmaintained.

Remediation

Immediate actions: (1) Implement parameterized queries/prepared statements in /admin/admin_index.php—replace all dynamic SQL string concatenation with prepared statements using bound parameters (e.g., mysqli_prepare or PDO with placeholders); (2) Add server-side input validation on the Username field (whitelist alphanumeric characters, reject SQL metacharacters); (3) Apply principle of least privilege to database credentials used by the application; (4) Implement Web Application Firewall (WAF) rules to detect and block SQL injection patterns in the Username parameter as interim protection. Long-term: Update to a patched version once released (vendor should provide v1.1 or later), or migrate to a maintained e-commerce platform. If no patch is available from code-projects, consider applying a comprehensive code review and security remediation internally or engaging a security vendor.

Priority Score

57
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +36
POC: +20

Share

EUVD-2025-18716 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy