Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12378: Unrestricted Upload in code-projects Simple Food Ordering System

0
Medium
VulnerabilityCVE-2025-12378cvecve-2025-12378
Published: Tue Oct 28 2025 (10/28/2025, 05:32:05 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Simple Food Ordering System

Description

A security flaw has been discovered in code-projects Simple Food Ordering System 1.0. This issue affects some unknown processing of the file /addproduct.php. Performing manipulation of the argument photo results in unrestricted upload. The attack may be initiated remotely. The exploit has been released to the public and may be exploited.

AI-Powered Analysis

AILast updated: 10/28/2025, 06:06:08 UTC

Technical Analysis

CVE-2025-12378 identifies a security vulnerability in the Simple Food Ordering System version 1.0 developed by code-projects. The flaw exists in the /addproduct.php script, specifically in the handling of the 'photo' parameter, which allows unrestricted file uploads. This means an attacker can remotely upload arbitrary files, including potentially malicious scripts, without any authentication or user interaction. The vulnerability arises from insufficient validation or sanitization of the uploaded file, enabling attackers to bypass restrictions that normally prevent unauthorized file types or sizes. Exploiting this vulnerability could allow attackers to execute arbitrary code on the server, leading to full system compromise, data theft, or disruption of service. The CVSS 4.0 base score of 6.9 reflects a medium severity, with network attack vector, low complexity, no privileges or user interaction required, and limited impact on confidentiality, integrity, and availability. Although no known exploits are currently active in the wild, the public release of exploit code increases the likelihood of attacks. The vulnerability affects only version 1.0 of the product, and no official patches have been linked yet, indicating a need for immediate mitigation by users.

Potential Impact

For European organizations using the Simple Food Ordering System 1.0, this vulnerability poses a significant risk. The ability to upload arbitrary files remotely can lead to unauthorized code execution, enabling attackers to compromise sensitive customer data, including payment information and personal details. This can result in data breaches, reputational damage, and regulatory penalties under GDPR. Additionally, attackers could disrupt ordering services, causing operational downtime and financial losses. The hospitality and food service sectors, which often rely on such ordering systems, could be particularly impacted. The medium severity rating suggests that while the vulnerability is serious, exploitation requires some technical capability but no authentication or user interaction, making it accessible to a broad range of attackers. The public availability of exploit code further increases the threat landscape, emphasizing the urgency for mitigation.

Mitigation Recommendations

European organizations should immediately implement strict server-side validation of all uploaded files, restricting allowed file types to safe image formats and verifying file contents beyond extensions. Employing file integrity checks and scanning uploads with antivirus solutions can help detect malicious payloads. Configuring the web server to prevent execution of uploaded files, such as placing uploads outside the web root or disabling script execution in upload directories, is critical. Monitoring logs for unusual upload activity and implementing rate limiting can reduce attack surface. Organizations should also seek vendor updates or patches and apply them promptly once available. If patching is delayed, consider temporary mitigations such as disabling the upload functionality or restricting access to the /addproduct.php endpoint via IP whitelisting or authentication. Regular security audits and penetration testing focused on file upload mechanisms will help identify residual risks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-28T00:08:53.369Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69005d1b5553ed2111ccc338

Added to database: 10/28/2025, 6:05:15 AM

Last enriched: 10/28/2025, 6:06:08 AM

Last updated: 10/28/2025, 9:34:44 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats