CVE-2025-13290: SQL Injection in code-projects Simple Food Ordering System
A vulnerability has been found in code-projects Simple Food Ordering System 1.0. Affected by this issue is some unknown functionality of the file /saveorder.php. Such manipulation of the argument ID leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-13290 identifies a SQL injection vulnerability in the Simple Food Ordering System version 1.0 developed by code-projects. The vulnerability resides in the /saveorder.php script, where the ID parameter is improperly sanitized, allowing attackers to inject malicious SQL code remotely. This injection can lead to unauthorized access or manipulation of the backend database, potentially exposing sensitive customer data, altering order information, or disrupting service availability. The vulnerability requires no user interaction and no authentication, increasing its risk profile. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P) indicates network attack vector, low attack complexity, no authentication, and partial impacts on confidentiality, integrity, and availability. Although no patches have been published yet, the public disclosure of the exploit increases the urgency for mitigation. The vulnerability is particularly relevant for organizations relying on this software for order processing, as exploitation could lead to data breaches or operational disruptions.
Potential Impact
For European organizations, especially SMEs in the food service and hospitality sectors using the Simple Food Ordering System, this vulnerability poses risks of unauthorized data access and manipulation. Exploitation could lead to leakage of customer personal and payment information, undermining GDPR compliance and resulting in legal and financial penalties. Integrity violations could cause incorrect order processing, damaging customer trust and operational efficiency. Availability impacts could disrupt order workflows, leading to revenue loss and reputational damage. The remote and unauthenticated nature of the attack vector increases the likelihood of exploitation, particularly in environments with exposed web interfaces. Organizations lacking robust network segmentation or web application firewalls may be more vulnerable. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially given public exploit disclosure.
Mitigation Recommendations
Organizations should immediately conduct a security review of the /saveorder.php file and the handling of the ID parameter. Implement strict input validation and sanitization to reject malicious SQL code. Refactor the code to use parameterized queries or prepared statements to prevent SQL injection. If possible, apply any vendor patches or updates once released. In the interim, deploy web application firewalls (WAFs) with rules targeting SQL injection patterns to block exploit attempts. Restrict network access to the ordering system to trusted IPs or VPN users where feasible. Conduct regular security testing, including automated scanning and manual code audits, to detect similar vulnerabilities. Educate developers on secure coding practices to prevent recurrence. Monitor logs for suspicious database queries or access patterns indicative of exploitation attempts. Finally, ensure backups of critical data are current to enable recovery in case of compromise.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland
CVE-2025-13290: SQL Injection in code-projects Simple Food Ordering System
Description
A vulnerability has been found in code-projects Simple Food Ordering System 1.0. Affected by this issue is some unknown functionality of the file /saveorder.php. Such manipulation of the argument ID leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-13290 identifies a SQL injection vulnerability in the Simple Food Ordering System version 1.0 developed by code-projects. The vulnerability resides in the /saveorder.php script, where the ID parameter is improperly sanitized, allowing attackers to inject malicious SQL code remotely. This injection can lead to unauthorized access or manipulation of the backend database, potentially exposing sensitive customer data, altering order information, or disrupting service availability. The vulnerability requires no user interaction and no authentication, increasing its risk profile. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P) indicates network attack vector, low attack complexity, no authentication, and partial impacts on confidentiality, integrity, and availability. Although no patches have been published yet, the public disclosure of the exploit increases the urgency for mitigation. The vulnerability is particularly relevant for organizations relying on this software for order processing, as exploitation could lead to data breaches or operational disruptions.
Potential Impact
For European organizations, especially SMEs in the food service and hospitality sectors using the Simple Food Ordering System, this vulnerability poses risks of unauthorized data access and manipulation. Exploitation could lead to leakage of customer personal and payment information, undermining GDPR compliance and resulting in legal and financial penalties. Integrity violations could cause incorrect order processing, damaging customer trust and operational efficiency. Availability impacts could disrupt order workflows, leading to revenue loss and reputational damage. The remote and unauthenticated nature of the attack vector increases the likelihood of exploitation, particularly in environments with exposed web interfaces. Organizations lacking robust network segmentation or web application firewalls may be more vulnerable. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially given public exploit disclosure.
Mitigation Recommendations
Organizations should immediately conduct a security review of the /saveorder.php file and the handling of the ID parameter. Implement strict input validation and sanitization to reject malicious SQL code. Refactor the code to use parameterized queries or prepared statements to prevent SQL injection. If possible, apply any vendor patches or updates once released. In the interim, deploy web application firewalls (WAFs) with rules targeting SQL injection patterns to block exploit attempts. Restrict network access to the ordering system to trusted IPs or VPN users where feasible. Conduct regular security testing, including automated scanning and manual code audits, to detect similar vulnerabilities. Educate developers on secure coding practices to prevent recurrence. Monitor logs for suspicious database queries or access patterns indicative of exploitation attempts. Finally, ensure backups of critical data are current to enable recovery in case of compromise.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-17T07:56:49.526Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 691b5188903b8a3ddb62ff61
Added to database: 11/17/2025, 4:47:04 PM
Last enriched: 11/17/2025, 4:48:19 PM
Last updated: 1/7/2026, 6:07:55 AM
Views: 47
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14835: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in opajaap WP Photo Album Plus
HighCVE-2026-0650: CWE-306 Missing Authentication for Critical Function in OpenFlagr Flagr
CriticalCVE-2025-15474: CWE-770 Allocation of Resources Without Limits or Throttling in AuntyFey AuntyFey Smart Combination Lock
MediumCVE-2025-14468: CWE-352 Cross-Site Request Forgery (CSRF) in mohammed_kaludi AMP for WP – Accelerated Mobile Pages
MediumCVE-2025-9611: CWE-749 Exposed Dangerous Method or Function in Microsoft Playwright
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.