Vulnerabilites related to ywxbear - PHP Basic BookStore Website
CVE-2025-11594 (GCVE-0-2025-11594)
Vulnerability from cvelistv5
Published
2025-10-11 09:02
Modified
2025-10-11 09:02
Severity ?
5.5 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RC:R
5.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RC:R
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RC:R
5.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RC:R
VLAI Severity ?
EPSS score ?
CWE
Summary
A vulnerability has been found in ywxbear PHP-Bookstore-Website-Example and PHP Basic BookStore Website up to 0e0b9f542f7a2d90a8d7f8c83caca69294e234e4. This issue affects some unknown processing of the file /index.php of the component Quantity Handler. Such manipulation leads to improper validation of specified quantity in input. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This product operates on a rolling release basis, ensuring continuous delivery. Consequently, there are no version details for either affected or updated releases.
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.327915 | vdb-entry | |
https://vuldb.com/?ctiid.327915 | signature, permissions-required | |
https://vuldb.com/?submit.671737 | third-party-advisory | |
https://github.com/Lianhaorui/Report/blob/main/Payment%20Logic%20Vulnerability.docx | exploit |
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | ywxbear | PHP-Bookstore-Website-Example |
Version: 0e0b9f542f7a2d90a8d7f8c83caca69294e234e4 |
||||||
|
{ "containers": { "cna": { "affected": [ { "modules": [ "Quantity Handler" ], "product": "PHP-Bookstore-Website-Example", "vendor": "ywxbear", "versions": [ { "status": "affected", "version": "0e0b9f542f7a2d90a8d7f8c83caca69294e234e4" } ] }, { "modules": [ "Quantity Handler" ], "product": "PHP Basic BookStore Website", "vendor": "ywxbear", "versions": [ { "status": "affected", "version": "0e0b9f542f7a2d90a8d7f8c83caca69294e234e4" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "lianhaorui (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in ywxbear PHP-Bookstore-Website-Example and PHP Basic BookStore Website up to 0e0b9f542f7a2d90a8d7f8c83caca69294e234e4. This issue affects some unknown processing of the file /index.php of the component Quantity Handler. Such manipulation leads to improper validation of specified quantity in input. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This product operates on a rolling release basis, ensuring continuous delivery. Consequently, there are no version details for either affected or updated releases." }, { "lang": "de", "value": "In ywxbear PHP-Bookstore-Website-Example and PHP Basic BookStore Website up to 0e0b9f542f7a2d90a8d7f8c83caca69294e234e4 ist eine Schwachstelle entdeckt worden. Betroffen hiervon ist ein unbekannter Ablauf der Datei /index.php der Komponente Quantity Handler. Durch das Manipulieren mit unbekannten Daten kann eine improper validation of specified quantity in input-Schwachstelle ausgenutzt werden. Der Angriff kann remote ausgef\u00fchrt werden. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung. Bei diesem Produkt handelt es sich um ein Rolling Release, das eine fortlaufende Bereitstellung erm\u00f6glicht. Aus diesem Grund stehen keine Versionsinformationen zu betroffenen oder aktualisierten Versionen zur Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 6.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 5, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N/E:POC/RL:ND/RC:UR", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1284", "description": "Improper Validation of Specified Quantity in Input", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-703", "description": "Improper Check or Handling of Exceptional Conditions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-10-11T09:02:05.497Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-327915 | ywxbear PHP-Bookstore-Website-Example Quantity index.php improper validation of specified quantity in input", "tags": [ "vdb-entry" ], "url": "https://vuldb.com/?id.327915" }, { "name": "VDB-327915 | CTI Indicators (IOB, IOC, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.327915" }, { "name": "Submit #671737 | PHP-Bookstore-Website-Example web 1 Business Logic Errors", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.671737" }, { "tags": [ "exploit" ], "url": "https://github.com/Lianhaorui/Report/blob/main/Payment%20Logic%20Vulnerability.docx" } ], "timeline": [ { "lang": "en", "time": "2025-10-10T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-10-10T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-10-10T14:33:59.000Z", "value": "VulDB entry last update" } ], "title": "ywxbear PHP-Bookstore-Website-Example Quantity index.php improper validation of specified quantity in input" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-11594", "datePublished": "2025-10-11T09:02:05.497Z", "dateReserved": "2025-10-10T12:28:53.584Z", "dateUpdated": "2025-10-11T09:02:05.497Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }