Intentionally vulnerable e-commerce demo for WAF testing.
Product search, user lookup, and login all use raw SQL. Try ' OR 1=1 --
Search results reflect user input unescaped into HTML. Try <script>alert(document.cookie)</script>
File viewer reads real files from disk. Try ../../../etc/passwd
URL fetcher makes real HTTP requests. Try http://169.254.169.254/latest/meta-data/
User profiles accessible by ID with no auth check. Try incrementing IDs.
Error pages leak stack traces. API endpoints expose internal data.