CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Lifecycle Timeline
4Tags
Description
A vulnerability, which was classified as critical, has been found in code-projects Online Shoe Store 1.0. Affected by this issue is some unknown functionality of the file /function/customer_signup.php. The manipulation of the argument email leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
Analysis
CVE-2025-6354 is a critical SQL injection vulnerability in code-projects Online Shoe Store 1.0 affecting the customer signup functionality (/function/customer_signup.php). An unauthenticated remote attacker can manipulate the email parameter to inject arbitrary SQL commands, potentially leading to unauthorized data access, modification, or deletion. The vulnerability has been publicly disclosed with proof-of-concept availability and demonstrates active exploitation potential.
Technical Context
This vulnerability is rooted in improper input validation and parameterization in PHP-based web application code. The affected file (customer_signup.php) fails to properly sanitize or use prepared statements when processing the email parameter before incorporating it into SQL queries. This is classified under CWE-74 (Improper Neutralization of Special Elements in Output Used by a Downstream Component), which encompasses SQL injection attacks where user-supplied input reaches database query construction without adequate escaping or parameterization. The Online Shoe Store application uses direct string concatenation or inadequate filtering when building SQL statements, allowing attackers to break out of intended query logic and execute arbitrary SQL commands against the backend database.
Affected Products
code-projects Online Shoe Store version 1.0 and likely earlier versions. CPE identifier would be: cpe:2.3:a:code-projects:online_shoe_store:1.0:*:*:*:*:*:*:*. The vulnerability specifically affects the /function/customer_signup.php endpoint. No patch version information is available in public disclosures; the vendor (code-projects) has not released a confirmed patched version. Users of all installations of this application should be considered vulnerable unless manual code remediation has been applied.
Remediation
Immediate remediation steps: (1) Implement parameterized queries using prepared statements in the customer_signup.php file—use mysqli prepared statements or PDO with bound parameters instead of string concatenation; (2) Apply input validation to reject malformed email addresses before database processing; (3) Use email validation regex patterns to ensure input conforms to RFC 5322 standards; (4) Implement stored procedures with parameterized inputs if possible; (5) Apply the principle of least privilege to database user accounts accessing the signup function, limiting permissions to INSERT operations only where feasible. Vendor patch: Contact code-projects for a patched version or consider migrating to an actively maintained e-commerce platform. If patched versions are unavailable, apply Web Application Firewall (WAF) rules to detect and block SQL injection patterns in the email parameter (e.g., blocking single quotes, SQL keywords like UNION, OR 1=1).
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-18767