CVE Alert: CVE-2025-11036 – code-projects – E-Commerce Website

CVE-2025-11036

HIGHNo exploitation knownPoC observed

A vulnerability was identified in code-projects E-Commerce Website 1.0. This affects an unknown function of the file /pages/admin_account_update.php. Such manipulation of the argument user_id leads to sql injection. The attack can be launched remotely. The exploit is publicly available and might be used.

CVSS v3.1 (7.3)
Vendor
code-projects
Product
E-Commerce Website
Versions
1.0
CWE
CWE-89, SQL Injection
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Published
2025-09-26T19:02:06.414Z
Updated
2025-09-26T19:29:03.899Z

AI Summary Analysis

Risk verdict

High risk: publicly reachable SQL injection with a PoC available and no authentication required, enabling remote exploitation.

Why this matters

Attackers can read or modify data in the database and potentially degrade service through the vulnerable admin function, threatening customer data and order integrity. Public PoC availability increases the likelihood of opportunistic exploitation and rapid weaponisation, with regulatory and reputational consequences for affected shops.

Most likely attack path

An external actor targets /pages/admin_account_update.php, injecting crafted input into user_id to trigger SQL injection without user credentials. With PR:N, UI:N and network access, exploitation can occur directly from the internet, potentially exposing confidential data and enabling limited data manipulation within the application’s database scope.

Who is most exposed

Public-facing e-commerce deployments with an exposed admin panel are at greatest risk, especially smaller sites using the vulnerable code-projects E-Commerce Website 1.0 setup or similar CMS-like frameworks.

Detection ideas

  • SQL error messages or unusual query patterns in web server and application logs.
  • Anomalous requests showing manipulated user_id parameters or payloads commonly associated with SQLi.
  • WAF/IDS alerts for SQL injection signatures targeting admin_account_update.php.
  • IOCs from VulDB/CISA indicators appearing in traffic or logs.
  • Sudden spikes in data retrieval or integrity-related anomalies.

Mitigation and prioritisation

  • Patch or upgrade to the fixed version; implement parameterised queries and proper input validation.
  • Refactor admin_account_update.php to use prepared statements; remove dynamic SQL.
  • Enforce least-privilege DB credentials and disable detailed DB error messages.
  • Harden exposure: IP allowlisting or VPN access to admin interfaces; deploy WAF rules specific to SQLi.
  • Change-management: test in staging, then rollout; monitor for signs of PoC attempts.
  • If KEV is confirmed or EPSS ≥ 0.5, treat as priority 1. If KEV/EPSS data remains unknown, maintain elevated monitoring and rapid remediation posture.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.