CVE-2025-11654

was · was Multiple Products

A high-severity vulnerability has been identified in multiple "was" products utilizing the Inferno Online Clothing Store component.

Executive summary

A high-severity vulnerability has been identified in multiple "was" products utilizing the Inferno Online Clothing Store component. This flaw could allow a remote, unauthenticated attacker to interact with the application's backend database, potentially leading to unauthorized access, modification, or deletion of sensitive data. Due to the low complexity of a potential attack, immediate remediation is critical to prevent data breaches and service disruption.

Vulnerability

The vulnerability is an unauthenticated SQL injection flaw within the product search functionality of the Inferno Online Clothing Store application. The application fails to properly sanitize user-supplied input before using it to construct a database query. A remote attacker can craft a malicious search query containing specific SQL commands, which will then be executed by the backend database. Successful exploitation allows an attacker to bypass security controls to read, modify, or delete data from the database, including customer information, order history, and product details.

Business impact

This vulnerability is rated as High severity with a CVSS score of 7.3. Exploitation could have a significant negative impact on the business. An attacker could exfiltrate sensitive customer data (personally identifiable information, payment details), leading to regulatory fines under data protection laws like GDPR and CCPA. Furthermore, an attacker could manipulate application data, causing financial loss (e.g., changing prices) or disrupt business operations by deleting critical information, resulting in reputational damage and loss of customer trust.

Remediation

Immediate Action: Identify all systems running the affected software component and apply the security updates provided by the vendor immediately. After patching, it is crucial to monitor systems for any signs of attempted or successful exploitation by reviewing web server and database access logs for anomalies that occurred prior to the patch.

Proactive Monitoring: Security teams should actively monitor for indicators of compromise. This includes inspecting web server logs for suspicious requests containing SQL syntax (e.g., ', --, UNION, SELECT) directed at application endpoints. Implement and monitor Web Application Firewall (WAF) alerts for SQL injection signatures. Database logs should be reviewed for unusual or long-running queries originating from the web application server.

Compensating Controls: If immediate patching is not feasible, implement a Web Application Firewall (WAF) with strict rules designed to block SQL injection attempts against the vulnerable application components. Restrict network access to the affected applications to trusted sources only, if possible. Enhance database monitoring to detect and alert on unauthorized data access or modification patterns.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the High severity rating (CVSS 7.3) and the fact that this vulnerability can be exploited by an unauthenticated attacker over the network, we recommend that organizations treat this as a critical priority. Although it is not yet on the CISA KEV list or being actively exploited, the risk of exploitation is significant. All affected systems should be identified and patched immediately to mitigate the risk of a potential data breach or service disruption.