CVE-2025-13323: SQL Injection in code-projects Simple Pizza Ordering System
A security flaw has been discovered in code-projects Simple Pizza Ordering System 1.0. Affected is an unknown function of the file /listorder.php. Performing manipulation of the argument ID results in sql injection. The attack can be initiated remotely. The exploit has been released to the public and may be exploited.
AI Analysis
Technical Summary
CVE-2025-13323 is a SQL injection vulnerability identified in the Simple Pizza Ordering System version 1.0 developed by code-projects. The vulnerability resides in the /listorder.php file, where an argument named ID is improperly sanitized, allowing an attacker to inject malicious SQL code remotely without requiring authentication or user interaction. This flaw enables attackers to manipulate backend database queries, potentially leading to unauthorized data access, data modification, or disruption of service. The vulnerability has been assigned a CVSS 4.0 score of 6.9, indicating a medium severity level due to its network exploitability, lack of required privileges, and no need for user interaction, but with limited impact on confidentiality, integrity, and availability. Although no active exploitation has been reported, the public release of an exploit increases the likelihood of attacks. The vulnerability affects only version 1.0 of the product, and no official patches have been linked yet. The root cause is the failure to properly validate and parameterize user input in SQL queries, a common and critical security oversight in web applications. This vulnerability highlights the importance of secure coding practices, particularly input validation and the use of prepared statements or parameterized queries to prevent SQL injection attacks.
Potential Impact
For European organizations using the Simple Pizza Ordering System 1.0, this vulnerability poses a risk of unauthorized access to sensitive customer and order data, which can lead to data breaches and loss of customer trust. Attackers could manipulate order information, potentially causing financial discrepancies or operational disruptions. The integrity of the ordering system could be compromised, leading to incorrect orders or denial of service. Given the remote and unauthenticated nature of the exploit, attackers can easily target vulnerable systems over the internet, increasing the attack surface. Small and medium-sized enterprises in the food service sector, which often rely on such off-the-shelf ordering systems, may be disproportionately affected. Additionally, regulatory compliance risks arise under GDPR if personal data is exposed or altered. The lack of known active exploitation currently reduces immediate risk but the public availability of an exploit elevates the threat level, necessitating prompt mitigation to avoid potential incidents.
Mitigation Recommendations
Organizations should immediately audit their deployments of the Simple Pizza Ordering System to identify affected versions (1.0). Since no official patches are currently available, developers or administrators should implement input validation and parameterized queries in the /listorder.php file to sanitize the ID parameter and prevent SQL injection. Employing prepared statements with bound parameters is critical. In parallel, deploying a web application firewall (WAF) with rules to detect and block SQL injection attempts can provide a protective layer. Restricting access to the ordering system to trusted networks or VPNs can reduce exposure. Regularly monitoring logs for suspicious query patterns or unusual database activity is recommended. Organizations should also plan to upgrade to a patched version once available or consider alternative ordering systems with secure coding practices. Training developers on secure coding standards and conducting code reviews focused on injection flaws will help prevent similar vulnerabilities in the future.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Netherlands, Belgium
CVE-2025-13323: SQL Injection in code-projects Simple Pizza Ordering System
Description
A security flaw has been discovered in code-projects Simple Pizza Ordering System 1.0. Affected is an unknown function of the file /listorder.php. Performing manipulation of the argument ID results in sql injection. The attack can be initiated remotely. The exploit has been released to the public and may be exploited.
AI-Powered Analysis
Technical Analysis
CVE-2025-13323 is a SQL injection vulnerability identified in the Simple Pizza Ordering System version 1.0 developed by code-projects. The vulnerability resides in the /listorder.php file, where an argument named ID is improperly sanitized, allowing an attacker to inject malicious SQL code remotely without requiring authentication or user interaction. This flaw enables attackers to manipulate backend database queries, potentially leading to unauthorized data access, data modification, or disruption of service. The vulnerability has been assigned a CVSS 4.0 score of 6.9, indicating a medium severity level due to its network exploitability, lack of required privileges, and no need for user interaction, but with limited impact on confidentiality, integrity, and availability. Although no active exploitation has been reported, the public release of an exploit increases the likelihood of attacks. The vulnerability affects only version 1.0 of the product, and no official patches have been linked yet. The root cause is the failure to properly validate and parameterize user input in SQL queries, a common and critical security oversight in web applications. This vulnerability highlights the importance of secure coding practices, particularly input validation and the use of prepared statements or parameterized queries to prevent SQL injection attacks.
Potential Impact
For European organizations using the Simple Pizza Ordering System 1.0, this vulnerability poses a risk of unauthorized access to sensitive customer and order data, which can lead to data breaches and loss of customer trust. Attackers could manipulate order information, potentially causing financial discrepancies or operational disruptions. The integrity of the ordering system could be compromised, leading to incorrect orders or denial of service. Given the remote and unauthenticated nature of the exploit, attackers can easily target vulnerable systems over the internet, increasing the attack surface. Small and medium-sized enterprises in the food service sector, which often rely on such off-the-shelf ordering systems, may be disproportionately affected. Additionally, regulatory compliance risks arise under GDPR if personal data is exposed or altered. The lack of known active exploitation currently reduces immediate risk but the public availability of an exploit elevates the threat level, necessitating prompt mitigation to avoid potential incidents.
Mitigation Recommendations
Organizations should immediately audit their deployments of the Simple Pizza Ordering System to identify affected versions (1.0). Since no official patches are currently available, developers or administrators should implement input validation and parameterized queries in the /listorder.php file to sanitize the ID parameter and prevent SQL injection. Employing prepared statements with bound parameters is critical. In parallel, deploying a web application firewall (WAF) with rules to detect and block SQL injection attempts can provide a protective layer. Restricting access to the ordering system to trusted networks or VPNs can reduce exposure. Regularly monitoring logs for suspicious query patterns or unusual database activity is recommended. Organizations should also plan to upgrade to a patched version once available or consider alternative ordering systems with secure coding practices. Training developers on secure coding standards and conducting code reviews focused on injection flaws will help prevent similar vulnerabilities in the future.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-17T16:48:59.085Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 691bb966d4c3ef3c7a511605
Added to database: 11/18/2025, 12:10:14 AM
Last enriched: 11/18/2025, 12:15:02 AM
Last updated: 11/18/2025, 7:44:14 AM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-7623: CWE-121: Stack-based Buffer Overflow in SMCI SYS-111C-NR
MediumCVE-2025-8076: CWE-121: Stack-based Buffer Overflow in SMCI MBD-X13SEDW-F
HighKongTuke activity, (Tue, Nov 18th)
MediumCVE-2025-12524: CWE-639 Authorization Bypass Through User-Controlled Key in johnjamesjacoby Post Type Switcher
MediumCVE-2025-48593: Remote code execution in Google Android
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.