Simple Shopping Cart

6 CVEs product

Monthly

CVE-2025-14248 HIGH POC This Week

A vulnerability was identified in code-projects Simple Shopping Cart 1.0. Impacted is an unknown function of the file /adminlogin.php. The manipulation of the argument admin_username leads to sql injection. The attack is possible to be carried out remotely. The exploit is publicly available and might be used.

PHP SQLi Simple Shopping Cart
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
0.0%
CVE-2025-14247 MEDIUM POC This Month

A vulnerability was determined in code-projects Simple Shopping Cart 1.0. This issue affects some unknown processing of the file /Admin/additems.php. Executing manipulation of the argument item_name can lead to sql injection. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized.

PHP SQLi Simple Shopping Cart
NVD GitHub VulDB
CVSS 3.1
6.3
EPSS
0.0%
CVE-2025-14246 MEDIUM POC This Month

A vulnerability was found in code-projects Simple Shopping Cart 1.0. This vulnerability affects unknown code of the file /Customers/settings.php. Performing manipulation of the argument user_id results in sql injection. Remote exploitation of the attack is possible. The exploit has been made public and could be used.

PHP SQLi Simple Shopping Cart
NVD GitHub VulDB
CVSS 3.1
6.3
EPSS
0.0%
CVE-2025-7609 HIGH POC This Week

CVE-2025-7609 is a critical SQL injection vulnerability in code-projects Simple Shopping Cart 1.0 affecting the /register.php endpoint via the ruser_email parameter. An unauthenticated remote attacker can exploit this to read, modify, or delete database contents, potentially compromising user data and application integrity. Public exploit code exists, increasing real-world exploitation risk.

PHP SQLi Remote Code Execution Simple Shopping Cart
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
0.0%
CVE-2025-7608 HIGH POC This Week

CVE-2025-7608 is a critical SQL injection vulnerability in code-projects Simple Shopping Cart 1.0 affecting the /userlogin.php endpoint's user_email parameter, allowing unauthenticated remote attackers to execute arbitrary SQL queries and potentially extract, modify, or delete database contents. The vulnerability has been publicly disclosed with proof-of-concept exploit code available, and while the CVSS score is 7.3 (moderate-to-high severity), the low attack complexity and lack of authentication requirements make this a high-priority exploit target for threat actors.

PHP SQLi Remote Code Execution Simple Shopping Cart
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
0.0%
CVE-2025-7607 HIGH POC This Week

CVE-2025-7607 is a critical SQL injection vulnerability in code-projects Simple Shopping Cart 1.0 affecting the /Customers/save_order.php file, where the order_price parameter is improperly sanitized, allowing remote unauthenticated attackers to execute arbitrary SQL queries. The vulnerability has a public exploit disclosure and carries a CVSS score of 7.3 with demonstrated real-world exploitation potential, making it a high-priority security concern for affected deployments.

PHP SQLi Simple Shopping Cart
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
0.0%
CVE-2025-14248
EPSS 0% CVSS 7.3
HIGH POC This Week

A vulnerability was identified in code-projects Simple Shopping Cart 1.0. Impacted is an unknown function of the file /adminlogin.php. The manipulation of the argument admin_username leads to sql injection. The attack is possible to be carried out remotely. The exploit is publicly available and might be used.

PHP SQLi Simple Shopping Cart
NVD GitHub VulDB
CVE-2025-14247
EPSS 0% CVSS 6.3
MEDIUM POC This Month

A vulnerability was determined in code-projects Simple Shopping Cart 1.0. This issue affects some unknown processing of the file /Admin/additems.php. Executing manipulation of the argument item_name can lead to sql injection. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized.

PHP SQLi Simple Shopping Cart
NVD GitHub VulDB
CVE-2025-14246
EPSS 0% CVSS 6.3
MEDIUM POC This Month

A vulnerability was found in code-projects Simple Shopping Cart 1.0. This vulnerability affects unknown code of the file /Customers/settings.php. Performing manipulation of the argument user_id results in sql injection. Remote exploitation of the attack is possible. The exploit has been made public and could be used.

PHP SQLi Simple Shopping Cart
NVD GitHub VulDB
CVE-2025-7609
EPSS 0% CVSS 7.3
HIGH POC This Week

CVE-2025-7609 is a critical SQL injection vulnerability in code-projects Simple Shopping Cart 1.0 affecting the /register.php endpoint via the ruser_email parameter. An unauthenticated remote attacker can exploit this to read, modify, or delete database contents, potentially compromising user data and application integrity. Public exploit code exists, increasing real-world exploitation risk.

PHP SQLi Remote Code Execution +1
NVD GitHub VulDB
CVE-2025-7608
EPSS 0% CVSS 7.3
HIGH POC This Week

CVE-2025-7608 is a critical SQL injection vulnerability in code-projects Simple Shopping Cart 1.0 affecting the /userlogin.php endpoint's user_email parameter, allowing unauthenticated remote attackers to execute arbitrary SQL queries and potentially extract, modify, or delete database contents. The vulnerability has been publicly disclosed with proof-of-concept exploit code available, and while the CVSS score is 7.3 (moderate-to-high severity), the low attack complexity and lack of authentication requirements make this a high-priority exploit target for threat actors.

PHP SQLi Remote Code Execution +1
NVD GitHub VulDB
CVE-2025-7607
EPSS 0% CVSS 7.3
HIGH POC This Week

CVE-2025-7607 is a critical SQL injection vulnerability in code-projects Simple Shopping Cart 1.0 affecting the /Customers/save_order.php file, where the order_price parameter is improperly sanitized, allowing remote unauthenticated attackers to execute arbitrary SQL queries. The vulnerability has a public exploit disclosure and carries a CVSS score of 7.3 with demonstrated real-world exploitation potential, making it a high-priority security concern for affected deployments.

PHP SQLi Simple Shopping Cart
NVD GitHub VulDB

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy