CVE-2025-56162

YOSHOP 2.0 suffers from an unauthenticated SQL injection in the goodsIds parameter of the /api/goods/listByIds endpoint. The getListByIds function concatenates user input into orderRaw('field(goods_id, ...)'), allowing attackers to: (a) enumerate or modify database data, including dumping admin password hashes; (b) write web-shell files or invoke xp_cmdshell, leading to remote code execution on servers configured with sufficient DB privileges.
Configurations

Configuration 1 (hide)

cpe:2.3:a:yiovo:firefly_mall:*:*:*:*:open_source:*:*:*

History

30 Oct 2025, 18:33

Type Values Removed Values Added
First Time Yiovo firefly Mall
Yiovo
CPE cpe:2.3:a:xany:yoshop2.0:-:*:*:*:*:*:*:* cpe:2.3:a:yiovo:firefly_mall:*:*:*:*:open_source:*:*:*

Information

Published : 2025-10-02 16:15

Updated : 2025-10-30 18:33


NVD link : CVE-2025-56162

Mitre link : CVE-2025-56162

CVE.ORG link : CVE-2025-56162


JSON object : View

Products Affected

yiovo

  • firefly_mall
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')