Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12930: SQL Injection in SourceCodester Food Ordering System

0
Medium
VulnerabilityCVE-2025-12930cvecve-2025-12930
Published: Mon Nov 10 2025 (11/10/2025, 04:02:07 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: Food Ordering System

Description

A vulnerability has been found in SourceCodester Food Ordering System 1.0. Affected is an unknown function of the file /view-ticket.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 11/17/2025, 04:45:52 UTC

Technical Analysis

CVE-2025-12930 is a SQL Injection vulnerability identified in SourceCodester Food Ordering System version 1.0, specifically in the /view-ticket.php script. The vulnerability arises from improper sanitization of the 'ID' parameter, which is directly used in SQL queries. An attacker can remotely manipulate this parameter to inject arbitrary SQL commands, potentially extracting, modifying, or deleting sensitive data from the backend database. The vulnerability does not require user interaction or authentication but does require low privileges (likely meaning low-level user access or unauthenticated access depending on context). The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). The vulnerability is publicly disclosed, but no known exploits are currently active in the wild. The lack of patches or official remediation increases the risk of exploitation. Given that food ordering systems handle sensitive customer data and transactional information, successful exploitation could lead to data breaches, unauthorized data manipulation, and service disruption. The SourceCodester Food Ordering System is used by small to medium enterprises, often in localized markets, which may lack advanced security controls, increasing exposure. The vulnerability highlights the critical need for secure coding practices, especially input validation and use of parameterized queries to prevent SQL injection attacks.

Potential Impact

For European organizations, exploitation of this vulnerability can lead to unauthorized access to sensitive customer data such as personal information, order details, and payment information, potentially violating GDPR regulations. Data integrity could be compromised, allowing attackers to alter orders or transactional records, which could disrupt business operations and damage customer trust. Availability impacts could arise if attackers execute destructive SQL commands, causing service outages or data loss. Small and medium-sized food service providers using this system may lack robust incident response capabilities, increasing the risk of prolonged downtime. Additionally, reputational damage and regulatory penalties could result from data breaches. The medium CVSS score reflects moderate risk, but the ease of remote exploitation without user interaction elevates concern. The lack of patches means organizations must rely on immediate mitigations to prevent exploitation. Overall, the threat poses a tangible risk to the confidentiality, integrity, and availability of food ordering services across Europe, especially where SourceCodester products are in use.

Mitigation Recommendations

1. Immediately implement input validation and sanitization on the 'ID' parameter in /view-ticket.php to reject malicious SQL syntax. 2. Refactor the application code to use parameterized queries or prepared statements to prevent SQL injection. 3. Employ Web Application Firewalls (WAFs) with rules targeting SQL injection patterns to block exploit attempts at the network perimeter. 4. Conduct thorough code reviews and security testing on all user input handling components within the food ordering system. 5. Monitor database logs and application logs for unusual queries or access patterns indicative of exploitation attempts. 6. Restrict database user permissions to the minimum necessary to limit the impact of a successful injection. 7. If possible, isolate the food ordering system in a segmented network zone to reduce lateral movement risk. 8. Engage with SourceCodester or community forums for any forthcoming patches or updates. 9. Educate developers and administrators on secure coding practices and the risks of SQL injection. 10. Prepare incident response plans specific to web application attacks to enable rapid containment if exploitation occurs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-09T20:10:23.633Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691166511e0afa394a9d233b

Added to database: 11/10/2025, 4:13:05 AM

Last enriched: 11/17/2025, 4:45:52 AM

Last updated: 12/23/2025, 7:30:43 AM

Views: 77

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats