Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10400: SQL Injection in SourceCodester Food Ordering Management System

0
Medium
VulnerabilityCVE-2025-10400cvecve-2025-10400
Published: Sun Sep 14 2025 (09/14/2025, 14:02:07 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: Food Ordering Management System

Description

A security vulnerability has been detected in SourceCodester Food Ordering Management System 1.0. Impacted is an unknown function of the file /routers/ticket-message.php. Such manipulation of the argument ticket_id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed publicly and may be used.

AI-Powered Analysis

AILast updated: 09/22/2025, 00:31:08 UTC

Technical Analysis

CVE-2025-10400 is a medium-severity SQL Injection vulnerability identified in version 1.0 of the SourceCodester Food Ordering Management System. The vulnerability exists in the /routers/ticket-message.php file, specifically related to the handling of the 'ticket_id' parameter. Improper sanitization or validation of this parameter allows an attacker to inject malicious SQL code remotely, without requiring authentication or user interaction. This can lead to unauthorized access or manipulation of the backend database, potentially exposing sensitive customer data, order details, or administrative information. The vulnerability has been publicly disclosed, increasing the risk of exploitation, although no known exploits are currently reported in the wild. The CVSS 4.0 score of 5.3 reflects a moderate risk, considering the attack vector is network-based with low complexity and no privileges or user interaction needed, but with limited impact on confidentiality, integrity, and availability. The vulnerability affects only version 1.0 of the product, which is a niche food ordering management system, typically deployed by small to medium-sized restaurants or food service providers.

Potential Impact

For European organizations, particularly those in the hospitality and food service sectors using SourceCodester Food Ordering Management System 1.0, this vulnerability poses a risk of unauthorized database access. Exploitation could lead to leakage of customer personal data, order histories, and potentially payment information if stored insecurely. This compromises customer privacy and may violate GDPR regulations, leading to legal and financial penalties. Additionally, attackers could manipulate order data, disrupt service availability, or escalate attacks within the network. The impact is more pronounced for organizations relying heavily on this system for online ordering and customer interaction, as disruption or data breach could damage reputation and operational continuity. However, the limited market penetration of this specific system in Europe and the absence of known active exploits somewhat reduce the immediate threat level.

Mitigation Recommendations

Organizations using SourceCodester Food Ordering Management System 1.0 should prioritize upgrading to a patched version once available or apply custom patches to sanitize and validate the 'ticket_id' parameter rigorously. In the interim, implementing Web Application Firewalls (WAFs) with rules to detect and block SQL injection patterns targeting ticket_id parameters can reduce risk. Regularly auditing and monitoring database queries and logs for anomalous activities is recommended. Restricting database user permissions to the minimum necessary can limit the impact of a successful injection. Additionally, isolating the food ordering system within a segmented network zone reduces lateral movement potential. Organizations should also review their data retention and encryption policies to minimize sensitive data exposure in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-13T19:36:40.246Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c6cbbe24663201be11a6b6

Added to database: 9/14/2025, 2:05:50 PM

Last enriched: 9/22/2025, 12:31:08 AM

Last updated: 10/30/2025, 3:17:10 AM

Views: 44

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats