CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Lifecycle Timeline
4Tags
Description
A vulnerability was found in code-projects Online Shoe Store 1.0. It has been rated as critical. This issue affects some unknown processing of the file /function/edit_customer.php. The manipulation of the argument firstname leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.
Analysis
CVE-2025-6307 is a critical SQL injection vulnerability in code-projects Online Shoe Store 1.0 affecting the /function/edit_customer.php file, where the 'firstname' parameter is insufficiently sanitized, allowing remote unauthenticated attackers to execute arbitrary SQL queries. The vulnerability has been publicly disclosed with proof-of-concept details available, and while rated 7.3 (High) in CVSS v3.1, the network-accessible attack vector combined with no authentication requirement and demonstrated public exploitation significantly elevates real-world risk. Other parameters in the same function are suspected to be vulnerable to the same injection pattern.
Technical Context
This vulnerability stems from CWE-74 (Improper Neutralization of Special Elements in Output Used by a Downstream Component - 'Injection'), specifically manifesting as SQL injection in a PHP web application. The affected endpoint /function/edit_customer.php processes user-supplied input from the 'firstname' parameter without proper parameterized queries, prepared statements, or input validation, allowing attackers to inject malicious SQL syntax directly into database queries. The Online Shoe Store application (CPE: cpe:2.3:a:code-projects:online_shoe_store:1.0:*:*:*:*:*:*:*) is a PHP-based e-commerce platform where customer data modification functionality has been inadequately protected against injection attacks. The vulnerability likely affects other customer attribute parameters (lastname, email, phone, etc.) that follow similar unsafe coding patterns within the same file.
Affected Products
Online Shoe Store (['1.0'])
Remediation
Immediate Mitigation: Disable or restrict access to /function/edit_customer.php until patching is available using web application firewall (WAF) rules or web server configuration Code-Level Patch: Replace all SQL query construction in edit_customer.php with parameterized prepared statements using PHP PDO or mysqli prepared statements: use placeholders (?) or named parameters instead of string concatenation Input Validation: Implement strict whitelist validation for the firstname parameter: allow only alphanumeric characters, hyphens, apostrophes, and spaces; enforce length limits (max 50 characters) Defense in Depth: Apply principle of least privilege to database user account: restrict permissions to only SELECT, UPDATE operations needed for customer editing, remove DROP/ALTER/EXEC permissions Upgrade Path: Contact code-projects vendor for patch or security update; if unavailable, consider migration to alternative e-commerce platforms with active security support Detection: Implement Web Application Firewall rules to detect and block SQL injection patterns in edit_customer.php requests; monitor database query logs for unusual SQL syntax
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-18722