CVE Alert: CVE-2025-11558 – code-projects – E-Commerce Website

CVE-2025-11558

HIGHNo exploitation known

A vulnerability was found in code-projects E-Commerce Website 1.0. Impacted is an unknown function of the file /pages/user_index_search.php. Performing manipulation of the argument Search results in sql injection. The attack is possible to be carried out remotely. The exploit has been made public and could be used.

CVSS v3.1 (7.3)
Vendor
code-projects
Product
E-Commerce Website
Versions
1.0
CWE
CWE-89, SQL Injection
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Published
2025-10-09T21:02:08.404Z
Updated
2025-10-09T21:02:08.404Z

AI Summary Analysis

Risk verdict

High risk: remote, unauthenticated SQL injection with a public exploit; remediation should be immediate.

Why this matters

Attackers can exfiltrate customer data, manipulate records, or disrupt service. No authentication is required and the vulnerability is network-exposed, increasing risk for online stores using the affected release.

Most likely attack path

An attacker injects via the Search parameter on /pages/user_index_search.php. The backend likely concatenates input into SQL, enabling data access or modification. A public PoC increases feasibility; if the database privileges permit, attackers could pivot to broader data access or integrity threats.

Who is most exposed

Publicly reachable e-commerce sites running older code on common stacks (PHP/MySQL) with the 1.0 release are most at risk.

Detection ideas

  • Unusual Search payloads in web logs containing SQL keywords (SELECT, UNION, OR 1=1).
  • Database errors or long-running queries linked to /pages/user_index_search.php.
  • Spikes in errors or latency during search requests.
  • IDS/IPS alerts for SQL injection patterns targeting the endpoint.

Mitigation and prioritisation

  • Apply vendor patch or upgrade; if not feasible, implement prepared statements and strict input validation in the affected code.
  • Enforce least-privilege for the web app’s DB user.
  • Enable WAF/IDS rules targeting SQLi in the Search parameter.
  • Consider temporarily disabling or restricting access to the endpoint until patched.
  • Enhance logging and monitor for exploitation attempts to guide rapid incident response.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.