YOSHOP 2.0 suffers from an unauthenticated SQL injection in the goodsIds parameter of the /api/goods/listByIds endpoint. The getListByIds function concatenates user input into orderRaw('field(goods_id, ...)'), allowing attackers to: (a) enumerate or modify database data, including dumping admin password hashes; (b) write web-shell files or invoke xp_cmdshell, leading to remote code execution on servers configured with sufficient DB privileges.
References
| Link | Resource |
|---|---|
| https://gitee.com/xany/yoshop2.0 | Product |
| https://github.com/ZyWAC/CVE-Disclosures/blob/6b337a44934ffe948275995e9b79158e97c78fc4/2025/YOSHOP2.0/CVE-2025-56162.md | Exploit Third Party Advisory |
Configurations
History
30 Oct 2025, 18:33
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:yiovo:firefly_mall:*:*:*:*:open_source:*:*:* | |
| First Time |
Yiovo
Yiovo firefly Mall |
07 Oct 2025, 17:48
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Xany yoshop2.0
Xany |
|
| CPE | cpe:2.3:a:xany:yoshop2.0:-:*:*:*:*:*:*:* | |
| References | () https://gitee.com/xany/yoshop2.0 - Product | |
| References | () https://github.com/ZyWAC/CVE-Disclosures/blob/6b337a44934ffe948275995e9b79158e97c78fc4/2025/YOSHOP2.0/CVE-2025-56162.md - Exploit, Third Party Advisory |
02 Oct 2025, 20:15
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
| CWE | CWE-89 |
02 Oct 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-02 16:15
Updated : 2025-10-30 18:33
NVD link : CVE-2025-56162
Mitre link : CVE-2025-56162
CVE.ORG link : CVE-2025-56162
JSON object : View
Products Affected
yiovo
- firefly_mall
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
