Description
EverShop is a TypeScript-first eCommerce platform. During category update and deletion event handling, the application embeds path / request_path values—derived from the url_key stored in the database—into SQL statements via string concatenation and passes them to execute(). As a result, if a malicious string is stored in url_key , subsequent event processing modifies and executes the SQL statement, leading to a second-order SQL injection. Patched from v2.1.1.
INFO
Published Date :
2026-02-10T17:43:38.998Z
Last Modified :
2026-02-10T19:29:56.966Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2026-25993 vulnerability.
| Vendors | Products |
|---|---|
| Evershop |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-25993.
CVSS Vulnerability Scoring System
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability