Impact
The affected code in ProductIndexServiceImpl allows an attacker to supply crafted input in the sidx/sort parameter, causing unsanitized data to be injected into a SQL statement. This flaw can lead to a remote SQL injection attack that is publicly available and may enable attackers to read, modify, or delete data stored in the database. It directly compromises confidentiality and integrity of the application's data records, as reflected by the identified CWE-74 and CWE-89 weaknesses.
Affected Systems
The vulnerability impacts the shsuishang modulithshop open‑source e‑commerce application. All releases up to revision 829bac71f507e84684c782b9b062b8bf3b5585d6 are affected. Because the project follows a rolling release model, no specific version numbers are published; deployments prior to commit 42bcb9463425d1be906c3b290cf29885eb5a2324 remain vulnerable.
Risk and Exploitability
With a CVSS score of 5.3 the issue is of medium severity, and no EPSS score is available. It is not listed in the CISA KEV catalog. Attackers can exploit the flaw remotely through the listItem endpoint, and a public exploit has already been released online. Regularly applying the referenced patch or upgrading to a newer commit is essential to mitigate this risk.
OpenCVE Enrichment