CVE-2014-5140

HIGH

Loadedcommerce Loaded7 - SQL Injection

Title source: rule
STIX 2.1

Description

The bindReplace function in the query factory in includes/classes/database.php in Loaded Commerce 7 does not properly handle : (colon) characters, which allows remote authenticated users to conduct SQL injection attacks via the First name and Last name fields in the address book.

Exploits (1)

exploitdb WORKING POC
by Breaking.Technology · textwebappsphp
https://www.exploit-db.com/exploits/34552

References (5)

Core 5
Core References
Exploit, Third Party Advisory, VDB Entry x_refsource_misc
http://www.exploit-db.com/exploits/34552
Third Party Advisory, VDB Entry x_refsource_misc
https://exchange.xforce.ibmcloud.com/vulnerabilities/95791
Patch, Third Party Advisory x_refsource_misc
https://github.com/loadedcommerce/loaded7/pull/520

Scores

CVSS v3 8.8
EPSS 0.0105
EPSS Percentile 77.7%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-89
Status published
Products (1)
loadedcommerce/loaded7
Published Jan 03, 2020
Tracked Since Feb 18, 2026