Skip to main content

CVE-2025-10400: SQL Injection in SourceCodester Food Ordering Management System

Medium
VulnerabilityCVE-2025-10400cvecve-2025-10400
Published: Sun Sep 14 2025 (09/14/2025, 14:02:07 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: Food Ordering Management System

Description

A security vulnerability has been detected in SourceCodester Food Ordering Management System 1.0. Impacted is an unknown function of the file /routers/ticket-message.php. Such manipulation of the argument ticket_id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed publicly and may be used.

AI-Powered Analysis

AILast updated: 09/14/2025, 14:06:13 UTC

Technical Analysis

CVE-2025-10400 is a medium-severity SQL Injection vulnerability identified in version 1.0 of the SourceCodester Food Ordering Management System. The vulnerability exists in an unspecified function within the /routers/ticket-message.php file, specifically involving the manipulation of the 'ticket_id' parameter. An attacker can exploit this flaw remotely without requiring user interaction or elevated privileges, by crafting malicious input to the 'ticket_id' argument. This input is improperly sanitized or validated, allowing the attacker to inject arbitrary SQL commands into the backend database query. Such SQL Injection attacks can lead to unauthorized data access, data modification, or even deletion, potentially compromising the confidentiality, integrity, and availability of the system's data. The CVSS 4.0 base score is 5.3, reflecting a medium impact with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The vulnerability affects only version 1.0 of the product, and no official patches or fixes have been published yet. Although no known exploits are currently observed in the wild, the public disclosure of the exploit code increases the risk of exploitation. The vulnerability's scope is limited to the Food Ordering Management System, which is typically used by restaurants or food service providers to manage orders and customer tickets. Exploitation could allow attackers to access sensitive customer data, order details, or internal ticketing information, potentially leading to data breaches or disruption of service.

Potential Impact

For European organizations using the SourceCodester Food Ordering Management System 1.0, this vulnerability poses a significant risk to the confidentiality and integrity of customer and order data. Food service providers often handle sensitive personal information, including customer names, contact details, and payment information. Successful exploitation could lead to unauthorized data disclosure, impacting customer privacy and potentially violating GDPR regulations. Additionally, attackers could manipulate order or ticket data, causing operational disruptions, financial losses, and reputational damage. The remote exploitability without authentication increases the threat level, especially for organizations that expose the vulnerable system to the internet or have insufficient network segmentation. Given the critical role of food ordering systems in business operations, any downtime or data compromise could affect service continuity and customer trust. Furthermore, the lack of available patches means organizations must rely on mitigation strategies to reduce exposure until an official fix is released.

Mitigation Recommendations

European organizations should implement the following specific mitigation measures: 1) Immediately restrict external access to the vulnerable /routers/ticket-message.php endpoint by applying network-level controls such as firewalls or web application firewalls (WAFs) configured to detect and block SQL injection patterns targeting the 'ticket_id' parameter. 2) Conduct a thorough code review and apply input validation and parameterized queries or prepared statements for all database interactions involving user-supplied input, especially the 'ticket_id' parameter, to prevent injection attacks. 3) If possible, upgrade or replace the vulnerable Food Ordering Management System with a patched or alternative solution that addresses this vulnerability. 4) Monitor application logs and database logs for suspicious activities indicative of SQL injection attempts, such as unusual query patterns or errors. 5) Implement strict access controls and network segmentation to isolate the food ordering system from sensitive internal networks and limit the blast radius of a potential compromise. 6) Educate IT and security teams about this vulnerability and ensure incident response plans include steps for SQL injection detection and remediation. 7) Regularly back up critical data and verify backup integrity to enable recovery in case of data corruption or deletion caused by exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-13T19:36:40.246Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c6cbbe24663201be11a6b6

Added to database: 9/14/2025, 2:05:50 PM

Last enriched: 9/14/2025, 2:06:13 PM

Last updated: 9/14/2025, 6:59:44 PM

Views: 5

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats