Description
Smartshop 1 contains a SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through the id parameter. Attackers can send GET requests to product.php with union-based SQL injection payloads in the id parameter to extract sensitive database information including usernames and database names.
Published: 2026-05-23
Score: 8.8 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Smartshop 1 contains a SQL injection vulnerability that allows attackers to inject malicious SQL through the id parameter in product.php. Unauthenticated users can send GET requests containing union-based payloads to execute arbitrary queries, extracting sensitive information such as usernames and database names. The weakness stems from improper handling of user input, classified as CWE‑89, and results in a breach of confidentiality.

Affected Systems

The affected product is Behance Smartshop. No specific version information is listed, so all current deployments of this application are potentially vulnerable until a patch or fix is applied.

Risk and Exploitability

The CVSS score of 8.8 indicates a high severity risk level. Exploitation is straightforward via a web request to product.php and requires no authentication. The EPSS score is not available, but the absence of mitigation and the nature of the vulnerability suggest a high likelihood of exploitation in the wild. The vulnerability is not listed in CISA KEV catalog.

Generated by OpenCVE AI on May 23, 2026 at 19:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Smartshop to the latest release that addresses SQL injection flaws
  • Apply strict input validation and sanitization on the id parameter, using parameterized queries or prepared statements
  • If an immediate patch is unavailable, implement a temporary measure such as whitelisting numeric IDs, employing a web application firewall rule to block SQL injection patterns, and restricting database privileges to the minimum required for application operation

Generated by OpenCVE AI on May 23, 2026 at 19:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 23 May 2026 18:45:00 +0000

Type Values Removed Values Added
Description Smartshop 1 contains a SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through the id parameter. Attackers can send GET requests to product.php with union-based SQL injection payloads in the id parameter to extract sensitive database information including usernames and database names.
Title Smartshop 1 SQL Injection via product.php id Parameter
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}

cvssV4_0

{'score': 8.8, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-05-23T18:30:44.302Z

Reserved: 2026-05-23T14:41:56.173Z

Link: CVE-2018-25341

cve-icon Vulnrichment

No data.

cve-icon NVD

No data.

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-23T19:30:25Z

Weaknesses