Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13323: SQL Injection in code-projects Simple Pizza Ordering System

0
Medium
VulnerabilityCVE-2025-13323cvecve-2025-13323
Published: Tue Nov 18 2025 (11/18/2025, 00:02:09 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Simple Pizza Ordering System

Description

A security flaw has been discovered in code-projects Simple Pizza Ordering System 1.0. Affected is an unknown function of the file /listorder.php. Performing manipulation of the argument ID results in sql injection. The attack can be initiated remotely. The exploit has been released to the public and may be exploited.

AI-Powered Analysis

AILast updated: 11/18/2025, 00:15:02 UTC

Technical Analysis

CVE-2025-13323 is a SQL injection vulnerability identified in the Simple Pizza Ordering System version 1.0 developed by code-projects. The vulnerability resides in the /listorder.php file, where an argument named ID is improperly sanitized, allowing an attacker to inject malicious SQL code remotely without requiring authentication or user interaction. This flaw enables attackers to manipulate backend database queries, potentially leading to unauthorized data access, data modification, or disruption of service. The vulnerability has been assigned a CVSS 4.0 score of 6.9, indicating a medium severity level due to its network exploitability, lack of required privileges, and no need for user interaction, but with limited impact on confidentiality, integrity, and availability. Although no active exploitation has been reported, the public release of an exploit increases the likelihood of attacks. The vulnerability affects only version 1.0 of the product, and no official patches have been linked yet. The root cause is the failure to properly validate and parameterize user input in SQL queries, a common and critical security oversight in web applications. This vulnerability highlights the importance of secure coding practices, particularly input validation and the use of prepared statements or parameterized queries to prevent SQL injection attacks.

Potential Impact

For European organizations using the Simple Pizza Ordering System 1.0, this vulnerability poses a risk of unauthorized access to sensitive customer and order data, which can lead to data breaches and loss of customer trust. Attackers could manipulate order information, potentially causing financial discrepancies or operational disruptions. The integrity of the ordering system could be compromised, leading to incorrect orders or denial of service. Given the remote and unauthenticated nature of the exploit, attackers can easily target vulnerable systems over the internet, increasing the attack surface. Small and medium-sized enterprises in the food service sector, which often rely on such off-the-shelf ordering systems, may be disproportionately affected. Additionally, regulatory compliance risks arise under GDPR if personal data is exposed or altered. The lack of known active exploitation currently reduces immediate risk but the public availability of an exploit elevates the threat level, necessitating prompt mitigation to avoid potential incidents.

Mitigation Recommendations

Organizations should immediately audit their deployments of the Simple Pizza Ordering System to identify affected versions (1.0). Since no official patches are currently available, developers or administrators should implement input validation and parameterized queries in the /listorder.php file to sanitize the ID parameter and prevent SQL injection. Employing prepared statements with bound parameters is critical. In parallel, deploying a web application firewall (WAF) with rules to detect and block SQL injection attempts can provide a protective layer. Restricting access to the ordering system to trusted networks or VPNs can reduce exposure. Regularly monitoring logs for suspicious query patterns or unusual database activity is recommended. Organizations should also plan to upgrade to a patched version once available or consider alternative ordering systems with secure coding practices. Training developers on secure coding standards and conducting code reviews focused on injection flaws will help prevent similar vulnerabilities in the future.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-17T16:48:59.085Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691bb966d4c3ef3c7a511605

Added to database: 11/18/2025, 12:10:14 AM

Last enriched: 11/18/2025, 12:15:02 AM

Last updated: 11/18/2025, 7:44:14 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats