YOSHOP 2.0 suffers from an unauthenticated SQL injection in the goodsIds parameter of the /api/goods/listByIds endpoint. The getListByIds function concatenates user input into orderRaw('field(goods_id, ...)'), allowing attackers to: (a) enumerate or modify database data, including dumping admin password hashes; (b) write web-shell files or invoke xp_cmdshell, leading to remote code execution on servers configured with sufficient DB privileges.
                
            References
                    | Link | Resource | 
|---|---|
| https://gitee.com/xany/yoshop2.0 | Product | 
| https://github.com/ZyWAC/CVE-Disclosures/blob/6b337a44934ffe948275995e9b79158e97c78fc4/2025/YOSHOP2.0/CVE-2025-56162.md | Exploit Third Party Advisory | 
Configurations
                    History
                    30 Oct 2025, 18:33
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time | Yiovo Yiovo firefly Mall | |
| CPE | cpe:2.3:a:yiovo:firefly_mall:*:*:*:*:open_source:*:*:* | 
07 Oct 2025, 17:48
| Type | Values Removed | Values Added | 
|---|---|---|
| CPE | cpe:2.3:a:xany:yoshop2.0:-:*:*:*:*:*:*:* | |
| First Time | Xany Xany yoshop2.0 | |
| References | () https://gitee.com/xany/yoshop2.0 - Product | |
| References | () https://github.com/ZyWAC/CVE-Disclosures/blob/6b337a44934ffe948275995e9b79158e97c78fc4/2025/YOSHOP2.0/CVE-2025-56162.md - Exploit, Third Party Advisory | 
02 Oct 2025, 20:15
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | v2 : v3 : | v2 : unknown v3 : 6.5 | 
| CWE | CWE-89 | 
02 Oct 2025, 16:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-10-02 16:15
Updated : 2025-10-30 18:33
NVD link : CVE-2025-56162
Mitre link : CVE-2025-56162
CVE.ORG link : CVE-2025-56162
JSON object : View
Products Affected
                yiovo
- firefly_mall
CWE
                
                    
                        
                        CWE-89
                        
            Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
