Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13290: SQL Injection in code-projects Simple Food Ordering System

0
Medium
VulnerabilityCVE-2025-13290cvecve-2025-13290
Published: Mon Nov 17 2025 (11/17/2025, 16:32:06 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Simple Food Ordering System

Description

A vulnerability has been found in code-projects Simple Food Ordering System 1.0. Affected by this issue is some unknown functionality of the file /saveorder.php. Such manipulation of the argument ID leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 11/17/2025, 16:48:19 UTC

Technical Analysis

CVE-2025-13290 identifies a SQL injection vulnerability in the Simple Food Ordering System version 1.0 developed by code-projects. The vulnerability resides in the /saveorder.php script, where the ID parameter is improperly sanitized, allowing attackers to inject malicious SQL code remotely. This injection can lead to unauthorized access or manipulation of the backend database, potentially exposing sensitive customer data, altering order information, or disrupting service availability. The vulnerability requires no user interaction and no authentication, increasing its risk profile. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P) indicates network attack vector, low attack complexity, no authentication, and partial impacts on confidentiality, integrity, and availability. Although no patches have been published yet, the public disclosure of the exploit increases the urgency for mitigation. The vulnerability is particularly relevant for organizations relying on this software for order processing, as exploitation could lead to data breaches or operational disruptions.

Potential Impact

For European organizations, especially SMEs in the food service and hospitality sectors using the Simple Food Ordering System, this vulnerability poses risks of unauthorized data access and manipulation. Exploitation could lead to leakage of customer personal and payment information, undermining GDPR compliance and resulting in legal and financial penalties. Integrity violations could cause incorrect order processing, damaging customer trust and operational efficiency. Availability impacts could disrupt order workflows, leading to revenue loss and reputational damage. The remote and unauthenticated nature of the attack vector increases the likelihood of exploitation, particularly in environments with exposed web interfaces. Organizations lacking robust network segmentation or web application firewalls may be more vulnerable. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially given public exploit disclosure.

Mitigation Recommendations

Organizations should immediately conduct a security review of the /saveorder.php file and the handling of the ID parameter. Implement strict input validation and sanitization to reject malicious SQL code. Refactor the code to use parameterized queries or prepared statements to prevent SQL injection. If possible, apply any vendor patches or updates once released. In the interim, deploy web application firewalls (WAFs) with rules targeting SQL injection patterns to block exploit attempts. Restrict network access to the ordering system to trusted IPs or VPN users where feasible. Conduct regular security testing, including automated scanning and manual code audits, to detect similar vulnerabilities. Educate developers on secure coding practices to prevent recurrence. Monitor logs for suspicious database queries or access patterns indicative of exploitation attempts. Finally, ensure backups of critical data are current to enable recovery in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-17T07:56:49.526Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691b5188903b8a3ddb62ff61

Added to database: 11/17/2025, 4:47:04 PM

Last enriched: 11/17/2025, 4:48:19 PM

Last updated: 11/17/2025, 5:53:06 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats