Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11604: SQL Injection in projectworlds Online Ordering Food System

0
Medium
VulnerabilityCVE-2025-11604cvecve-2025-11604
Published: Sat Oct 11 2025 (10/11/2025, 14:02:05 UTC)
Source: CVE Database V5
Vendor/Project: projectworlds
Product: Online Ordering Food System

Description

CVE-2025-11604 is a medium severity SQL injection vulnerability in projectworlds Online Ordering Food System version 1. 0, specifically in the /all-orders. php file via manipulation of the 'Status' parameter. This flaw allows unauthenticated remote attackers to inject SQL commands, potentially leading to partial compromise of confidentiality, integrity, and availability of the backend database. Although no known exploits are currently in the wild, the vulnerability has been publicly disclosed, increasing the risk of exploitation. The vulnerability does not require user interaction or privileges, making it easier to exploit remotely. European organizations using this software for food ordering and delivery services could face data breaches, order manipulation, or service disruption. Mitigation requires immediate input validation and parameterized queries, as no official patches are yet available. Countries with higher adoption of projectworlds Online Ordering Food System or significant food service sectors, such as Germany, France, Italy, Spain, and the UK, are most likely to be affected. Given the CVSS 4.

AI-Powered Analysis

AILast updated: 10/11/2025, 14:26:12 UTC

Technical Analysis

CVE-2025-11604 identifies a SQL injection vulnerability in version 1.0 of the projectworlds Online Ordering Food System, specifically within the /all-orders.php endpoint. The vulnerability arises from improper sanitization and validation of the 'Status' parameter, which is used in SQL queries without adequate protection. This allows remote attackers to inject malicious SQL code, potentially enabling unauthorized data access, data modification, or disruption of database operations. The vulnerability requires no authentication or user interaction, increasing its risk profile. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and partial impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although no known exploits are currently active in the wild, the public disclosure of the vulnerability increases the likelihood of exploitation attempts. The lack of an official patch or mitigation guidance from the vendor necessitates immediate defensive measures by users of this software. The vulnerability primarily threatens the backend database integrity and confidentiality, potentially exposing sensitive customer order data or allowing attackers to manipulate order statuses, which could disrupt business operations and customer trust.

Potential Impact

For European organizations utilizing the projectworlds Online Ordering Food System, this vulnerability poses significant risks including unauthorized access to customer data, manipulation of order information, and potential disruption of food ordering services. Such impacts could lead to financial losses, reputational damage, and regulatory penalties under GDPR due to data breaches. The ability to remotely exploit the vulnerability without authentication increases the attack surface, especially for organizations with externally accessible ordering platforms. The partial compromise of confidentiality and integrity could expose personally identifiable information (PII) and order details, while availability impacts could disrupt service continuity. Given the critical role of online ordering systems in the food service industry, exploitation could also affect supply chain operations and customer satisfaction. Organizations in countries with large food delivery markets and high adoption of this software are at greater risk, potentially impacting a broad range of SMEs and larger enterprises in the hospitality sector.

Mitigation Recommendations

Since no official patches are currently available, European organizations should immediately implement input validation and sanitization on the 'Status' parameter within /all-orders.php to prevent SQL injection. Employing parameterized queries or prepared statements in the database access layer is critical to mitigate injection risks. Network-level protections such as Web Application Firewalls (WAFs) should be configured to detect and block SQL injection patterns targeting this endpoint. Organizations should conduct thorough code reviews and penetration testing focused on SQL injection vectors. Restricting database user permissions to the minimum necessary can limit the impact of a successful injection. Monitoring logs for suspicious query patterns and anomalous database activity can provide early detection of exploitation attempts. Additionally, organizations should consider isolating the vulnerable system from public networks or limiting access via VPN or IP whitelisting until a vendor patch is released. Finally, maintaining regular backups of databases ensures recovery capability in case of data corruption or loss.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-10T13:00:49.927Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ea65895baaa01f1cbb6470

Added to database: 10/11/2025, 2:11:21 PM

Last enriched: 10/11/2025, 2:26:12 PM

Last updated: 10/11/2025, 5:00:57 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats