CVE-2025-11480

A vulnerability was detected in SourceCodester Simple E-Commerce Bookstore 1.0. The affected element is an unknown function of the file /register.php. Performing manipulation of the argument register_username results in sql injection. The attack is possible to be carried out remotely. The exploit is now public and may be used.
References
Link Resource
https://github.com/DrNbnonono/CVE/issues/8 Exploit Third Party Advisory Issue Tracking
https://vuldb.com/?ctiid.327598 Permissions Required VDB Entry
https://vuldb.com/?id.327598 Third Party Advisory VDB Entry
https://vuldb.com/?submit.667391 Third Party Advisory VDB Entry
https://www.sourcecodester.com/ Product
Configurations

Configuration 1 (hide)

cpe:2.3:a:janobe:simple_e-commerce_bookstore:1.0:*:*:*:*:*:*:*

History

09 Oct 2025, 16:08

Type Values Removed Values Added
First Time Janobe simple E-commerce Bookstore
Janobe
References () https://github.com/DrNbnonono/CVE/issues/8 - () https://github.com/DrNbnonono/CVE/issues/8 - Exploit, Third Party Advisory, Issue Tracking
References () https://vuldb.com/?ctiid.327598 - () https://vuldb.com/?ctiid.327598 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.327598 - () https://vuldb.com/?id.327598 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.667391 - () https://vuldb.com/?submit.667391 - Third Party Advisory, VDB Entry
References () https://www.sourcecodester.com/ - () https://www.sourcecodester.com/ - Product
CPE cpe:2.3:a:janobe:simple_e-commerce_bookstore:1.0:*:*:*:*:*:*:*

08 Oct 2025, 15:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-10-08 15:16

Updated : 2025-10-09 16:08


NVD link : CVE-2025-11480

Mitre link : CVE-2025-11480

CVE.ORG link : CVE-2025-11480


JSON object : View

Products Affected

janobe

  • simple_e-commerce_bookstore
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')