CVE-2025-11604: SQL Injection in projectworlds Online Ordering Food System
CVE-2025-11604 is a medium severity SQL injection vulnerability in projectworlds Online Ordering Food System version 1. 0, specifically in the /all-orders. php file via manipulation of the 'Status' parameter. This flaw allows unauthenticated remote attackers to inject SQL commands, potentially leading to partial compromise of confidentiality, integrity, and availability of the backend database. Although no known exploits are currently in the wild, the vulnerability has been publicly disclosed, increasing the risk of exploitation. The vulnerability does not require user interaction or privileges, making it easier to exploit remotely. European organizations using this software for food ordering and delivery services could face data breaches, order manipulation, or service disruption. Mitigation requires immediate input validation and parameterized queries, as no official patches are yet available. Countries with higher adoption of projectworlds Online Ordering Food System or significant food service sectors, such as Germany, France, Italy, Spain, and the UK, are most likely to be affected. Given the CVSS 4.
AI Analysis
Technical Summary
CVE-2025-11604 identifies a SQL injection vulnerability in version 1.0 of the projectworlds Online Ordering Food System, specifically within the /all-orders.php endpoint. The vulnerability arises from improper sanitization and validation of the 'Status' parameter, which is used in SQL queries without adequate protection. This allows remote attackers to inject malicious SQL code, potentially enabling unauthorized data access, data modification, or disruption of database operations. The vulnerability requires no authentication or user interaction, increasing its risk profile. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and partial impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although no known exploits are currently active in the wild, the public disclosure of the vulnerability increases the likelihood of exploitation attempts. The lack of an official patch or mitigation guidance from the vendor necessitates immediate defensive measures by users of this software. The vulnerability primarily threatens the backend database integrity and confidentiality, potentially exposing sensitive customer order data or allowing attackers to manipulate order statuses, which could disrupt business operations and customer trust.
Potential Impact
For European organizations utilizing the projectworlds Online Ordering Food System, this vulnerability poses significant risks including unauthorized access to customer data, manipulation of order information, and potential disruption of food ordering services. Such impacts could lead to financial losses, reputational damage, and regulatory penalties under GDPR due to data breaches. The ability to remotely exploit the vulnerability without authentication increases the attack surface, especially for organizations with externally accessible ordering platforms. The partial compromise of confidentiality and integrity could expose personally identifiable information (PII) and order details, while availability impacts could disrupt service continuity. Given the critical role of online ordering systems in the food service industry, exploitation could also affect supply chain operations and customer satisfaction. Organizations in countries with large food delivery markets and high adoption of this software are at greater risk, potentially impacting a broad range of SMEs and larger enterprises in the hospitality sector.
Mitigation Recommendations
Since no official patches are currently available, European organizations should immediately implement input validation and sanitization on the 'Status' parameter within /all-orders.php to prevent SQL injection. Employing parameterized queries or prepared statements in the database access layer is critical to mitigate injection risks. Network-level protections such as Web Application Firewalls (WAFs) should be configured to detect and block SQL injection patterns targeting this endpoint. Organizations should conduct thorough code reviews and penetration testing focused on SQL injection vectors. Restricting database user permissions to the minimum necessary can limit the impact of a successful injection. Monitoring logs for suspicious query patterns and anomalous database activity can provide early detection of exploitation attempts. Additionally, organizations should consider isolating the vulnerable system from public networks or limiting access via VPN or IP whitelisting until a vendor patch is released. Finally, maintaining regular backups of databases ensures recovery capability in case of data corruption or loss.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Netherlands, Belgium
CVE-2025-11604: SQL Injection in projectworlds Online Ordering Food System
Description
CVE-2025-11604 is a medium severity SQL injection vulnerability in projectworlds Online Ordering Food System version 1. 0, specifically in the /all-orders. php file via manipulation of the 'Status' parameter. This flaw allows unauthenticated remote attackers to inject SQL commands, potentially leading to partial compromise of confidentiality, integrity, and availability of the backend database. Although no known exploits are currently in the wild, the vulnerability has been publicly disclosed, increasing the risk of exploitation. The vulnerability does not require user interaction or privileges, making it easier to exploit remotely. European organizations using this software for food ordering and delivery services could face data breaches, order manipulation, or service disruption. Mitigation requires immediate input validation and parameterized queries, as no official patches are yet available. Countries with higher adoption of projectworlds Online Ordering Food System or significant food service sectors, such as Germany, France, Italy, Spain, and the UK, are most likely to be affected. Given the CVSS 4.
AI-Powered Analysis
Technical Analysis
CVE-2025-11604 identifies a SQL injection vulnerability in version 1.0 of the projectworlds Online Ordering Food System, specifically within the /all-orders.php endpoint. The vulnerability arises from improper sanitization and validation of the 'Status' parameter, which is used in SQL queries without adequate protection. This allows remote attackers to inject malicious SQL code, potentially enabling unauthorized data access, data modification, or disruption of database operations. The vulnerability requires no authentication or user interaction, increasing its risk profile. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and partial impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although no known exploits are currently active in the wild, the public disclosure of the vulnerability increases the likelihood of exploitation attempts. The lack of an official patch or mitigation guidance from the vendor necessitates immediate defensive measures by users of this software. The vulnerability primarily threatens the backend database integrity and confidentiality, potentially exposing sensitive customer order data or allowing attackers to manipulate order statuses, which could disrupt business operations and customer trust.
Potential Impact
For European organizations utilizing the projectworlds Online Ordering Food System, this vulnerability poses significant risks including unauthorized access to customer data, manipulation of order information, and potential disruption of food ordering services. Such impacts could lead to financial losses, reputational damage, and regulatory penalties under GDPR due to data breaches. The ability to remotely exploit the vulnerability without authentication increases the attack surface, especially for organizations with externally accessible ordering platforms. The partial compromise of confidentiality and integrity could expose personally identifiable information (PII) and order details, while availability impacts could disrupt service continuity. Given the critical role of online ordering systems in the food service industry, exploitation could also affect supply chain operations and customer satisfaction. Organizations in countries with large food delivery markets and high adoption of this software are at greater risk, potentially impacting a broad range of SMEs and larger enterprises in the hospitality sector.
Mitigation Recommendations
Since no official patches are currently available, European organizations should immediately implement input validation and sanitization on the 'Status' parameter within /all-orders.php to prevent SQL injection. Employing parameterized queries or prepared statements in the database access layer is critical to mitigate injection risks. Network-level protections such as Web Application Firewalls (WAFs) should be configured to detect and block SQL injection patterns targeting this endpoint. Organizations should conduct thorough code reviews and penetration testing focused on SQL injection vectors. Restricting database user permissions to the minimum necessary can limit the impact of a successful injection. Monitoring logs for suspicious query patterns and anomalous database activity can provide early detection of exploitation attempts. Additionally, organizations should consider isolating the vulnerable system from public networks or limiting access via VPN or IP whitelisting until a vendor patch is released. Finally, maintaining regular backups of databases ensures recovery capability in case of data corruption or loss.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-10-10T13:00:49.927Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68ea65895baaa01f1cbb6470
Added to database: 10/11/2025, 2:11:21 PM
Last enriched: 10/11/2025, 2:26:12 PM
Last updated: 10/11/2025, 5:00:57 PM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11607: Path Traversal in harry0703 MoneyPrinterTurbo
MediumCVE-2025-11606: SQL Injection in iPynch Social Network Website
MediumCVE-2025-11605: SQL Injection in code-projects Client Details System
MediumCVE-2025-11603: SQL Injection in code-projects Simple Food Ordering System
MediumCVE-2025-11601: SQL Injection in SourceCodester Online Student Result System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.