CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Lifecycle Timeline
4Tags
Description
A vulnerability was found in code-projects Online Shoe Store 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /cart.php. The manipulation of the argument qty[] leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
Analysis
CVE-2025-6304 is a critical SQL injection vulnerability in code-projects Online Shoe Store 1.0 affecting the /cart.php file's qty[] parameter, allowing unauthenticated remote attackers to execute arbitrary SQL queries and potentially extract, modify, or delete sensitive data. The vulnerability has been publicly disclosed with proof-of-concept exploits available, presenting immediate exploitation risk to unpatched instances of this e-commerce application.
Technical Context
The vulnerability exists in the cart.php file of the Online Shoe Store application, where user-supplied input from the qty[] (quantity array) parameter is improperly sanitized before being incorporated into SQL queries. This represents a classic CWE-74 (Improper Neutralization of Special Elements in Output Used by a Downstream Component - 'Injection') vulnerability, specifically SQL injection. The lack of parameterized queries or input validation on array-based parameters allows attackers to inject malicious SQL syntax through the quantity field, potentially bypassing authentication and authorization controls. The affected product is code-projects Online Shoe Store version 1.0, a PHP-based e-commerce application that appears to use a traditional relational database backend without proper prepared statement implementation.
Affected Products
code-projects Online Shoe Store version 1.0. The specific affected component is /cart.php with vulnerable parameter: qty[]. CPE designation would be: cpe:2.3:a:code-projects:online_shoe_store:1.0:*:*:*:*:*:*:*. No patch version information is publicly available in standard vulnerability databases, indicating this appears to be abandonware or unmaintained software. Affected organizations operating this application without active vendor support should prioritize immediate remediation.
Remediation
Immediate actions: (1) Apply input validation to qty[] parameters—use whitelist approach accepting only numeric values, rejecting special characters; (2) Implement parameterized queries/prepared statements for all database interactions in cart.php, replacing string concatenation with bound parameters; (3) If patches are unavailable from vendor (code-projects appears to lack active support), implement Web Application Firewall (WAF) rules blocking SQL injection patterns in cart requests; (4) Disable or isolate the Online Shoe Store application if not actively maintained and migrate to a supported e-commerce platform (WooCommerce, Magento, Shopify, etc.); (5) Conduct immediate database audit for unauthorized access or data exfiltration via this vector; (6) Apply principle of least privilege to database user account used by cart.php (remove administrative rights). Long-term: Migrate away from unsupported code-projects application to a actively maintained e-commerce solution.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-18718