Cyber Posture

CVE-2025-1858

HighPublic PoC

Published: 03 March 2025

Published
03 March 2025
Modified
24 June 2025
KEV Added
Patch
CVSS Score 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0022 44.8th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-1858 is a high-severity Injection (CWE-74) vulnerability in Codezips Online Shopping Website. Its CVSS base score is 7.3 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 44.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-10 enforces information input validation at system entry points, directly preventing SQL injection by sanitizing the vulnerable 'id' parameter in /success.php before database query execution.

prevent

SI-2 requires identification, reporting, and correction of flaws, directly addressing the SQL injection vulnerability in /success.php through patching or code remediation.

prevent

SI-9 restricts information inputs to approved types and formats, preventing malicious SQL payloads from being processed in the 'id' argument.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1505 Server Software Component Persistence
Adversaries may abuse legitimate extensible development features of servers to establish persistent access to systems.
T1213.006 Databases Collection
Adversaries may leverage databases to mine valuable information.
Why these techniques?

SQL injection vulnerability in public-facing web application (/success.php) enables exploitation of public-facing applications (T1190), abuse of server software components (T1505 as assigned in advisory), and collection of data from databases (T1213.006).

NVD Description

A vulnerability classified as critical was found in Codezips Online Shopping Website 1.0. This vulnerability affects unknown code of the file /success.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit…

more

has been disclosed to the public and may be used.

Deeper analysisAI

CVE-2025-1858 is a critical SQL injection vulnerability (CWE-74, CWE-89) discovered in Codezips Online Shopping Website 1.0. It affects unknown code within the /success.php file, where manipulation of the 'id' argument enables the injection. The vulnerability was published on 2025-03-03 and carries a CVSS v3.1 base score of 7.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L).

Remote attackers require no privileges or user interaction to exploit this vulnerability over the network with low attack complexity. Successful exploitation allows limited impacts on confidentiality, integrity, and availability, such as unauthorized data access, modification, or disruption via injected SQL payloads.

Advisories from VulDB and a GitHub repository document the issue, noting that the exploit has been publicly disclosed and may be actively used by attackers. No specific patches or mitigations are detailed in the available references.

Details

CWE(s)

Affected Products

codezips
online shopping website
1.0

CVEs Like This One

CVE-2025-1903Same product: Codezips Online Shopping Website
CVE-2025-1856Same vendor: Codezips
CVE-2025-0532Same vendor: Codezips
CVE-2025-0541Same vendor: Codezips
CVE-2025-1850Same vendor: Codezips
CVE-2025-0233Same vendor: Codezips
CVE-2025-0535Same vendor: Codezips
CVE-2025-1188Same vendor: Codezips
CVE-2025-1959Same vendor: Codezips
CVE-2025-0336Same vendor: Codezips

References