Impact
The vulnerability resides in the signup.php script of Simple and Nice Shopping Cart Script 1.0. By sending a crafted Username parameter, an attacker can perform SQL injection that may lead to unauthorized data access or modification. This flaw allows execution of arbitrary SQL statements against the underlying database.
Affected Systems
SourceCodester Simple and Nice Shopping Cart Script version 1.0, used on web servers hosting the shopping cart application. The vulnerability is tied to the signup.php file within this product.
Risk and Exploitability
The CVSS base score of 6.9 indicates moderate severity, while the EPSS score of less than 1% implies a low likelihood of exploitation within the current prevalence. The flaw can be triggered remotely through the public web interface, and is publicly disclosed with documented proof of concept. Although it is not listed in the KEV catalog, the lack of an immediate patch means administrators must act promptly to mitigate potential attacks.
OpenCVE Enrichment