Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11612: SQL Injection in code-projects Simple Food Ordering System

0
Medium
VulnerabilityCVE-2025-11612cvecve-2025-11612
Published: Sat Oct 11 2025 (10/11/2025, 19:02:05 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Simple Food Ordering System

Description

A vulnerability has been found in code-projects Simple Food Ordering System 1.0. This impacts an unknown function of the file /addproduct.php. The manipulation of the argument Category leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 10/19/2025, 00:58:41 UTC

Technical Analysis

CVE-2025-11612 identifies a SQL injection vulnerability in the Simple Food Ordering System version 1.0 developed by code-projects. The flaw exists in the /addproduct.php script, where the Category parameter is improperly sanitized, allowing an attacker to inject malicious SQL code remotely without requiring authentication or user interaction. This injection can manipulate backend database queries, potentially exposing sensitive data, modifying records, or disrupting database integrity. The vulnerability has a CVSS 4.0 base score of 5.3, reflecting medium severity, with low complexity of attack and no privileges or user interaction needed. Although no known exploits are currently active in the wild, the public disclosure increases the risk of exploitation attempts. The affected software is typically used by small to medium food service businesses for order management, which may limit the scale but not the criticality of impact. No official patches have been linked yet, so organizations must implement immediate mitigations such as input validation and prepared statements. Monitoring database logs for anomalous queries is also recommended. The vulnerability highlights the importance of secure coding practices in web applications handling business-critical operations.

Potential Impact

For European organizations using the Simple Food Ordering System 1.0, this vulnerability could lead to unauthorized access to customer data, order information, and potentially payment details stored in the backend database. This compromises confidentiality and integrity, potentially resulting in data breaches, financial loss, reputational damage, and regulatory penalties under GDPR. Availability impact is limited but possible if attackers manipulate or delete critical data. Small and medium enterprises in the food service sector, which often rely on such niche software, are particularly at risk. The ease of remote exploitation without authentication increases the threat level. Organizations may face operational disruptions if attackers exploit the vulnerability to alter orders or product information. The public disclosure without an available patch raises urgency for mitigation. Overall, the impact is moderate but significant for affected entities, especially those handling sensitive customer data or operating in regulated environments.

Mitigation Recommendations

1. Immediately implement input validation and sanitization on the Category parameter in /addproduct.php to reject or properly escape malicious input. 2. Refactor the application code to use parameterized queries or prepared statements to prevent SQL injection. 3. If patch updates become available from the vendor, prioritize timely application of these patches. 4. Deploy web application firewalls (WAF) with rules targeting SQL injection attempts specific to this parameter and endpoint. 5. Conduct thorough code reviews and security testing of the entire application to identify and remediate similar injection flaws. 6. Monitor database logs and application logs for unusual query patterns or errors indicative of injection attempts. 7. Restrict database user permissions to the minimum necessary to limit damage in case of exploitation. 8. Educate development and IT teams about secure coding practices and the risks of SQL injection. 9. Consider isolating or replacing the vulnerable system if immediate remediation is not feasible, especially in high-risk environments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-10T15:08:13.125Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68eaabda5baaa01f1cce7baf

Added to database: 10/11/2025, 7:11:22 PM

Last enriched: 10/19/2025, 12:58:41 AM

Last updated: 12/4/2025, 4:38:58 AM

Views: 87

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats