CVE-2025-0205
Published: 04 January 2025
Summary
CVE-2025-0205 is a medium-severity Injection (CWE-74) vulnerability in Code-Projects Online Shoe Store. Its CVSS base score is 6.3 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 21.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents SQL injection by validating the format, syntax, and semantics of the 'id' argument in /details2.php before processing.
Requires timely remediation of the specific SQL injection flaw in the Online Shoe Store 1.0 application to eliminate the vulnerability.
Restricts the 'id' argument to approved types, lengths, and formats, blocking malicious SQL injection payloads remotely.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in public-facing web app (/details2.php) enables exploitation of public-facing application (T1190), abuse of server software component for potential RCE (T1505 as assigned by VulDB), and data collection from databases (T1213.006) via unauthorized DB queries.
NVD Description
A vulnerability classified as critical has been found in code-projects Online Shoe Store 1.0. Affected is an unknown function of the file /details2.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack…
more
remotely. The exploit has been disclosed to the public and may be used.
Deeper analysisAI
CVE-2025-0205 is a SQL injection vulnerability (CWE-74, CWE-89) classified as critical in the code-projects Online Shoe Store 1.0 application. The flaw resides in an unknown function within the /details2.php file, where manipulation of the 'id' argument enables SQL injection. It carries a CVSS v3.1 base score of 6.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L) and was published on 2025-01-04.
The vulnerability is exploitable remotely by an attacker possessing low privileges. Successful exploitation can result in low-level impacts to confidentiality, integrity, and availability.
Advisories from VulDB (ctiid.290142, id.290142, submit.474032) provide further details, including a public exploit disclosed via a GitHub Gist. The project site at code-projects.org hosts the affected software, but no specific patch or mitigation steps are outlined in the CVE description.
The exploit has been disclosed to the public and may be used by attackers.
Details
- CWE(s)