EverShop is a TypeScript-first eCommerce platform. During category update and deletion event handling, the application embeds
path / request_path values—derived from the url_key stored in the database—into SQL statements via string concatenation and passes them to execute(). As a result, if a malicious string is stored in url_key , subsequent event processing modifies and executes the SQL statement, leading to a second-order SQL injection. Patched from v2.1.1.
Metrics
Affected Vendors & Products
References
History
Tue, 10 Feb 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 10 Feb 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | EverShop is a TypeScript-first eCommerce platform. During category update and deletion event handling, the application embeds path / request_path values—derived from the url_key stored in the database—into SQL statements via string concatenation and passes them to execute(). As a result, if a malicious string is stored in url_key , subsequent event processing modifies and executes the SQL statement, leading to a second-order SQL injection. Patched from v2.1.1. | |
| Title | EverShop has a Second-Order SQL Injection in URL Rewrite Processing Derived from Category URL Keys | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-10T19:29:56.966Z
Reserved: 2026-02-09T17:41:55.858Z
Link: CVE-2026-25993
Updated: 2026-02-10T19:29:49.956Z
Status : Received
Published: 2026-02-10T18:16:38.957
Modified: 2026-02-10T18:16:38.957
Link: CVE-2026-25993
No data.
OpenCVE Enrichment
No data.