CVE-2025-11613: SQL Injection in code-projects Simple Food Ordering System
A vulnerability was found in code-projects Simple Food Ordering System 1.0. Affected is an unknown function of the file /addcategory.php. The manipulation of the argument cname results in sql injection. The attack can be launched remotely. The exploit has been made public and could be used.
AI Analysis
Technical Summary
CVE-2025-11613 identifies a SQL injection vulnerability in the Simple Food Ordering System version 1.0 developed by code-projects. The vulnerability resides in the /addcategory.php script, where the cname parameter is improperly sanitized, allowing an attacker to inject malicious SQL code. This injection flaw enables remote attackers to manipulate backend SQL queries, potentially extracting sensitive data, modifying database contents, or disrupting service availability. The vulnerability does not require authentication or user interaction, increasing its exploitability. The CVSS 4.0 base score is 5.3 (medium), reflecting the attack vector as network-based with low attack complexity and no privileges or user interaction needed, but with limited impact on confidentiality, integrity, and availability. Although no active exploits have been reported in the wild, a public exploit is available, which could facilitate attacks by less skilled adversaries. The affected product is typically used in food ordering and hospitality environments, where database integrity and confidentiality are critical. The lack of official patches necessitates immediate mitigation through secure coding practices such as parameterized queries and input validation to prevent exploitation.
Potential Impact
For European organizations, especially those in the hospitality and food service sectors using the Simple Food Ordering System, this vulnerability poses a risk of unauthorized data disclosure, data tampering, and potential service disruption. Compromise of the ordering system database could lead to leakage of customer information, order details, and business-sensitive data, undermining customer trust and regulatory compliance (e.g., GDPR). Additionally, attackers could alter menu categories or order data, impacting business operations and revenue. The remote and unauthenticated nature of the exploit increases the likelihood of attacks, particularly targeting smaller businesses with limited cybersecurity resources. The medium severity indicates moderate risk, but the availability of a public exploit elevates the urgency for mitigation to prevent exploitation that could cascade into broader network compromise or reputational damage.
Mitigation Recommendations
1. Immediately review and update the /addcategory.php script to implement parameterized queries or prepared statements, eliminating direct concatenation of user input into SQL commands. 2. Apply strict input validation and sanitization on the cname parameter to ensure only expected data formats are accepted. 3. Conduct a comprehensive code audit of the entire application to identify and remediate similar injection points. 4. If possible, isolate the ordering system within a segmented network zone to limit exposure. 5. Monitor logs for unusual database query patterns or repeated attempts to exploit the cname parameter. 6. Engage with the vendor or community to obtain or develop official patches or updates. 7. Educate staff on the risks of SQL injection and ensure secure development lifecycle practices are followed for future updates. 8. Implement web application firewalls (WAFs) with rules targeting SQL injection attempts as an additional protective layer.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Netherlands, Belgium
CVE-2025-11613: SQL Injection in code-projects Simple Food Ordering System
Description
A vulnerability was found in code-projects Simple Food Ordering System 1.0. Affected is an unknown function of the file /addcategory.php. The manipulation of the argument cname results in sql injection. The attack can be launched remotely. The exploit has been made public and could be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-11613 identifies a SQL injection vulnerability in the Simple Food Ordering System version 1.0 developed by code-projects. The vulnerability resides in the /addcategory.php script, where the cname parameter is improperly sanitized, allowing an attacker to inject malicious SQL code. This injection flaw enables remote attackers to manipulate backend SQL queries, potentially extracting sensitive data, modifying database contents, or disrupting service availability. The vulnerability does not require authentication or user interaction, increasing its exploitability. The CVSS 4.0 base score is 5.3 (medium), reflecting the attack vector as network-based with low attack complexity and no privileges or user interaction needed, but with limited impact on confidentiality, integrity, and availability. Although no active exploits have been reported in the wild, a public exploit is available, which could facilitate attacks by less skilled adversaries. The affected product is typically used in food ordering and hospitality environments, where database integrity and confidentiality are critical. The lack of official patches necessitates immediate mitigation through secure coding practices such as parameterized queries and input validation to prevent exploitation.
Potential Impact
For European organizations, especially those in the hospitality and food service sectors using the Simple Food Ordering System, this vulnerability poses a risk of unauthorized data disclosure, data tampering, and potential service disruption. Compromise of the ordering system database could lead to leakage of customer information, order details, and business-sensitive data, undermining customer trust and regulatory compliance (e.g., GDPR). Additionally, attackers could alter menu categories or order data, impacting business operations and revenue. The remote and unauthenticated nature of the exploit increases the likelihood of attacks, particularly targeting smaller businesses with limited cybersecurity resources. The medium severity indicates moderate risk, but the availability of a public exploit elevates the urgency for mitigation to prevent exploitation that could cascade into broader network compromise or reputational damage.
Mitigation Recommendations
1. Immediately review and update the /addcategory.php script to implement parameterized queries or prepared statements, eliminating direct concatenation of user input into SQL commands. 2. Apply strict input validation and sanitization on the cname parameter to ensure only expected data formats are accepted. 3. Conduct a comprehensive code audit of the entire application to identify and remediate similar injection points. 4. If possible, isolate the ordering system within a segmented network zone to limit exposure. 5. Monitor logs for unusual database query patterns or repeated attempts to exploit the cname parameter. 6. Engage with the vendor or community to obtain or develop official patches or updates. 7. Educate staff on the risks of SQL injection and ensure secure development lifecycle practices are followed for future updates. 8. Implement web application firewalls (WAFs) with rules targeting SQL injection attempts as an additional protective layer.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-10-10T15:09:12.752Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68eab2d95baaa01f1cd0f778
Added to database: 10/11/2025, 7:41:13 PM
Last enriched: 10/11/2025, 7:56:14 PM
Last updated: 10/12/2025, 7:02:21 AM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-31992: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in HCL Software MaxAI Assistant
MediumCVE-2025-11628: SQL Injection in jimit105 Project-Online-Shopping-Website
MediumCVE-2025-52616: CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere in HCL Software Unica
MediumCVE-2025-11599: SQL Injection in Campcodes Online Apartment Visitor Management System
MediumCVE-2025-11610: SQL Injection in SourceCodester Simple Inventory System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.