CVE-2026-25993 PUBLISHED

EverShop has a Second-Order SQL Injection in URL Rewrite Processing Derived from Category URL Keys

Assigner: GitHub_M
Reserved: 09.02.2026 Published: 10.02.2026 Updated: 10.02.2026

EverShop is a TypeScript-first eCommerce platform. During category update and deletion event handling, the application embeds path / request_path values—derived from the url_key stored in the database—into SQL statements via string concatenation and passes them to execute(). As a result, if a malicious string is stored in url_key , subsequent event processing modifies and executes the SQL statement, leading to a second-order SQL injection. Patched from v2.1.1.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
CVSS Score: 9.3

Product Status

Vendor evershopcommerce
Product evershop
Versions
  • Version < 2.1.1 is affected

References

Problem Types

  • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') CWE