Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12315: SQL Injection in code-projects Food Ordering System

0
Medium
VulnerabilityCVE-2025-12315cvecve-2025-12315
Published: Mon Oct 27 2025 (10/27/2025, 20:02:12 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Food Ordering System

Description

A vulnerability was determined in code-projects Food Ordering System 1.0. This affects an unknown function of the file /admin/menu.php. Executing manipulation of the argument itemPrice can lead to sql injection. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized.

AI-Powered Analysis

AILast updated: 11/04/2025, 03:07:16 UTC

Technical Analysis

CVE-2025-12315 is a SQL injection vulnerability identified in the code-projects Food Ordering System version 1.0. The flaw exists in the /admin/menu.php file where the itemPrice parameter is improperly sanitized, allowing an attacker to inject malicious SQL code. This vulnerability can be exploited remotely but requires the attacker to have high-level privileges (likely administrative access) to the system. The injection can lead to partial compromise of the database confidentiality, integrity, and availability, such as unauthorized data access, modification, or deletion. The CVSS 4.0 vector indicates no user interaction is needed, no scope change, and no security controls bypassed, but the attack complexity is low and no privileges are required beyond high privileges already held. Although no public exploits are currently known, the vulnerability has been publicly disclosed, increasing the risk of future exploitation. The affected product is used primarily in food ordering and hospitality environments, where database integrity and confidentiality are critical for business operations and customer trust. The lack of available patches at the time of disclosure necessitates immediate mitigation through access control and input validation.

Potential Impact

For European organizations, especially those in the hospitality and food service sectors using the vulnerable Food Ordering System 1.0, this vulnerability poses risks of unauthorized data exposure or manipulation. Attackers with administrative access could exploit the SQL injection to extract sensitive customer data, alter menu pricing, or disrupt ordering processes, impacting business operations and customer trust. The partial confidentiality and integrity impacts could lead to regulatory compliance issues under GDPR if personal data is compromised. Availability impacts, while limited, could disrupt service continuity. Given the requirement for high privileges, the threat is more significant if internal accounts are compromised or if administrative interfaces are exposed externally. The medium severity rating suggests a moderate risk, but the potential business impact in critical service environments warrants prompt attention.

Mitigation Recommendations

Organizations should immediately restrict access to the /admin/menu.php interface to trusted administrators only, ideally through network segmentation and VPNs. Implement strong authentication and monitor administrative account activity for suspicious behavior. Apply strict input validation and sanitization on the itemPrice parameter, preferably using parameterized queries or prepared statements to prevent SQL injection. Since no official patch is currently available, consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting this parameter. Conduct regular security audits and penetration tests focusing on administrative modules. Educate administrators on the risks of credential compromise and enforce strong password policies and multi-factor authentication. Monitor threat intelligence feeds for updates on exploit availability and patch releases from the vendor.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-26T17:23:00.758Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ffd495ba6dffc5e20c6593

Added to database: 10/27/2025, 8:22:45 PM

Last enriched: 11/4/2025, 3:07:16 AM

Last updated: 12/11/2025, 8:53:23 PM

Views: 73

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats