EUVD-2025-21354

| CVE-2025-7609 HIGH
2025-07-14 [email protected]
7.3
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low

Lifecycle Timeline

4
Analysis Generated
Mar 16, 2026 - 09:43 vuln.today
EUVD ID Assigned
Mar 16, 2026 - 09:43 euvd
EUVD-2025-21354
PoC Detected
Oct 23, 2025 - 20:06 vuln.today
Public exploit code
CVE Published
Jul 14, 2025 - 14:15 nvd
HIGH 7.3

Description

A vulnerability has been found in code-projects Simple Shopping Cart 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /register.php. The manipulation of the argument ruser_email leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

Analysis

CVE-2025-7609 is a critical SQL injection vulnerability in code-projects Simple Shopping Cart 1.0 affecting the /register.php endpoint via the ruser_email parameter. An unauthenticated remote attacker can exploit this to read, modify, or delete database contents, potentially compromising user data and application integrity. Public exploit code exists, increasing real-world exploitation risk.

Technical Context

The vulnerability is a classic SQL injection flaw (CWE-74: Improper Neutralization of Special Elements used in an Output Command) in PHP-based web application code. The /register.php file fails to properly sanitize or parameterize SQL queries using user-supplied input from the ruser_email POST/GET parameter. Rather than using prepared statements with bound parameters, the application concatenates user input directly into SQL queries. Simple Shopping Cart 1.0 is a lightweight PHP e-commerce framework typically deployed on Apache/Nginx with MySQL/MariaDB backends. The lack of input validation and parameterized query usage represents a fundamental secure coding failure in the registration workflow.

Affected Products

code-projects Simple Shopping Cart version 1.0 and potentially earlier versions. CPE would be: cpe:2.3:a:code-projects:simple_shopping_cart:1.0:*:*:*:*:php:*:*. The vulnerability specifically impacts installations where user registration is enabled and the ruser_email parameter is processed by /register.php. No vendor advisory links or alternative version numbers were provided; however, versions post-1.0 may also be affected if the /register.php SQL injection was not patched in minor/patch releases.

Remediation

Immediate actions: (1) Upgrade Simple Shopping Cart to a patched version if available from the code-projects repository (verify with vendor); (2) If no patch exists, apply input validation: use prepared statements with parameterized queries for all SQL operations, specifically in /register.php for the ruser_email parameter; (3) Implement parameterized queries using MySQLi prepared statements or PDO with bound parameters instead of string concatenation; (4) Add input validation: enforce email format validation using filter_var($email, FILTER_VALIDATE_EMAIL) before database operations; (5) Apply principle of least privilege to database user credentials (restrict SQL injection impact); (6) Consider Web Application Firewall (WAF) rules to detect SQL injection patterns in the ruser_email parameter as a temporary layer. Long-term: migrate to a maintained e-commerce platform with modern secure coding practices.

Priority Score

57
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +36
POC: +20

Share

EUVD-2025-21354 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy