Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11613: SQL Injection in code-projects Simple Food Ordering System

0
Medium
VulnerabilityCVE-2025-11613cvecve-2025-11613
Published: Sat Oct 11 2025 (10/11/2025, 19:32:06 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Simple Food Ordering System

Description

A vulnerability was found in code-projects Simple Food Ordering System 1.0. Affected is an unknown function of the file /addcategory.php. The manipulation of the argument cname results in sql injection. The attack can be launched remotely. The exploit has been made public and could be used.

AI-Powered Analysis

AILast updated: 10/11/2025, 19:56:14 UTC

Technical Analysis

CVE-2025-11613 identifies a SQL injection vulnerability in the Simple Food Ordering System version 1.0 developed by code-projects. The vulnerability resides in the /addcategory.php script, where the cname parameter is improperly sanitized, allowing an attacker to inject malicious SQL code. This injection flaw enables remote attackers to manipulate backend SQL queries, potentially extracting sensitive data, modifying database contents, or disrupting service availability. The vulnerability does not require authentication or user interaction, increasing its exploitability. The CVSS 4.0 base score is 5.3 (medium), reflecting the attack vector as network-based with low attack complexity and no privileges or user interaction needed, but with limited impact on confidentiality, integrity, and availability. Although no active exploits have been reported in the wild, a public exploit is available, which could facilitate attacks by less skilled adversaries. The affected product is typically used in food ordering and hospitality environments, where database integrity and confidentiality are critical. The lack of official patches necessitates immediate mitigation through secure coding practices such as parameterized queries and input validation to prevent exploitation.

Potential Impact

For European organizations, especially those in the hospitality and food service sectors using the Simple Food Ordering System, this vulnerability poses a risk of unauthorized data disclosure, data tampering, and potential service disruption. Compromise of the ordering system database could lead to leakage of customer information, order details, and business-sensitive data, undermining customer trust and regulatory compliance (e.g., GDPR). Additionally, attackers could alter menu categories or order data, impacting business operations and revenue. The remote and unauthenticated nature of the exploit increases the likelihood of attacks, particularly targeting smaller businesses with limited cybersecurity resources. The medium severity indicates moderate risk, but the availability of a public exploit elevates the urgency for mitigation to prevent exploitation that could cascade into broader network compromise or reputational damage.

Mitigation Recommendations

1. Immediately review and update the /addcategory.php script to implement parameterized queries or prepared statements, eliminating direct concatenation of user input into SQL commands. 2. Apply strict input validation and sanitization on the cname parameter to ensure only expected data formats are accepted. 3. Conduct a comprehensive code audit of the entire application to identify and remediate similar injection points. 4. If possible, isolate the ordering system within a segmented network zone to limit exposure. 5. Monitor logs for unusual database query patterns or repeated attempts to exploit the cname parameter. 6. Engage with the vendor or community to obtain or develop official patches or updates. 7. Educate staff on the risks of SQL injection and ensure secure development lifecycle practices are followed for future updates. 8. Implement web application firewalls (WAFs) with rules targeting SQL injection attempts as an additional protective layer.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-10T15:09:12.752Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68eab2d95baaa01f1cd0f778

Added to database: 10/11/2025, 7:41:13 PM

Last enriched: 10/11/2025, 7:56:14 PM

Last updated: 10/12/2025, 7:02:21 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats