Enviar #659662: projectworlds Shopping Cart System 1.0 SQL Injectioninformación

Títuloprojectworlds Shopping Cart System 1.0 SQL Injection
DescripciónDuring the security assessment of "Shopping Cart System", I detected a critical SQL injection vulnerability in the "cart_remove.php" file. This vulnerability is attributed to the insufficient validation of user input for the "id" parameter. This inadequacy enables attackers to inject malicious SQL queries. Consequently, attackers can access the database without proper authorization, modify or delete data, and obtain sensitive information. Immediate corrective actions are essential to safeguard system security and uphold data integrity.
Fuente⚠️ https://github.com/underatted/CVE/issues/8
Usuario
 underatted (UID 90321)
Sumisión2025-09-21 15:57 (hace 7 meses)
Moderación2025-09-26 14:12 (5 days later)
EstadoDuplicado
Entrada de VulDB188893 [ProjectWorlds Online Shopping System PHP 1.0 Parameter cart_remove.php ID inyección SQL]
Puntos0

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!