CVE-2025-13323: SQL Injection in code-projects Simple Pizza Ordering System
A security flaw has been discovered in code-projects Simple Pizza Ordering System 1.0. Affected is an unknown function of the file /listorder.php. Performing manipulation of the argument ID results in sql injection. The attack can be initiated remotely. The exploit has been released to the public and may be exploited.
AI Analysis
Technical Summary
CVE-2025-13323 identifies a SQL Injection vulnerability in the Simple Pizza Ordering System version 1.0 developed by code-projects. The vulnerability resides in the /listorder.php file, where the ID parameter is improperly sanitized, allowing an attacker to inject malicious SQL code remotely without requiring authentication or user interaction. This flaw can be exploited by manipulating the ID argument to execute arbitrary SQL commands on the backend database, potentially leading to unauthorized data disclosure, data modification, or disruption of service. The CVSS 4.0 score of 6.9 reflects a medium severity, considering the attack vector is network-based with low attack complexity and no privileges or user interaction needed. The impact on confidentiality, integrity, and availability is limited but non-negligible, as the vulnerability allows partial compromise of these security properties. Although no known exploits are currently active in the wild, the public availability of exploit code increases the risk of exploitation. The lack of official patches or updates at the time of publication necessitates immediate mitigation efforts by users of this software. The vulnerability is significant for organizations relying on this ordering system, especially those handling sensitive customer data or payment information. The technical root cause is the absence of proper input validation and the failure to use parameterized queries or prepared statements in the affected PHP script. Remediation involves code correction to sanitize inputs and prevent SQL injection vectors.
Potential Impact
For European organizations using the Simple Pizza Ordering System 1.0, this vulnerability poses a risk of unauthorized access to customer order data, potentially including personal and payment information. Exploitation could lead to data breaches, loss of customer trust, and regulatory non-compliance under GDPR due to exposure of personal data. Additionally, attackers might alter order data or disrupt service availability, impacting business operations and revenue. Small and medium-sized food service businesses, which often rely on such specialized ordering systems, may lack robust cybersecurity defenses, increasing their vulnerability. The public release of exploit code raises the likelihood of opportunistic attacks, including automated scanning and exploitation by cybercriminals. The impact extends beyond data loss to potential reputational damage and financial penalties. Organizations may also face operational disruptions if attackers manipulate order processing or database integrity. Given the interconnected nature of supply chains in the food industry, a successful attack could have cascading effects on partners and customers across Europe.
Mitigation Recommendations
Immediate mitigation should focus on reviewing and updating the /listorder.php script to implement strict input validation and sanitization for the ID parameter. Developers should refactor the code to use prepared statements or parameterized queries to eliminate SQL injection vectors. In the absence of an official patch, organizations can apply web application firewalls (WAFs) with custom rules to detect and block malicious SQL injection attempts targeting the ID parameter. Monitoring and logging of web application traffic should be enhanced to detect suspicious activities. Organizations should conduct security assessments and penetration testing on their deployment of the Simple Pizza Ordering System to identify and remediate similar vulnerabilities. Backup procedures should be verified to ensure data integrity in case of compromise. Additionally, restricting database user privileges to the minimum necessary can limit the impact of a successful injection. Finally, organizations should stay alert for vendor updates or patches and apply them promptly once released.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Netherlands, Belgium
CVE-2025-13323: SQL Injection in code-projects Simple Pizza Ordering System
Description
A security flaw has been discovered in code-projects Simple Pizza Ordering System 1.0. Affected is an unknown function of the file /listorder.php. Performing manipulation of the argument ID results in sql injection. The attack can be initiated remotely. The exploit has been released to the public and may be exploited.
AI-Powered Analysis
Technical Analysis
CVE-2025-13323 identifies a SQL Injection vulnerability in the Simple Pizza Ordering System version 1.0 developed by code-projects. The vulnerability resides in the /listorder.php file, where the ID parameter is improperly sanitized, allowing an attacker to inject malicious SQL code remotely without requiring authentication or user interaction. This flaw can be exploited by manipulating the ID argument to execute arbitrary SQL commands on the backend database, potentially leading to unauthorized data disclosure, data modification, or disruption of service. The CVSS 4.0 score of 6.9 reflects a medium severity, considering the attack vector is network-based with low attack complexity and no privileges or user interaction needed. The impact on confidentiality, integrity, and availability is limited but non-negligible, as the vulnerability allows partial compromise of these security properties. Although no known exploits are currently active in the wild, the public availability of exploit code increases the risk of exploitation. The lack of official patches or updates at the time of publication necessitates immediate mitigation efforts by users of this software. The vulnerability is significant for organizations relying on this ordering system, especially those handling sensitive customer data or payment information. The technical root cause is the absence of proper input validation and the failure to use parameterized queries or prepared statements in the affected PHP script. Remediation involves code correction to sanitize inputs and prevent SQL injection vectors.
Potential Impact
For European organizations using the Simple Pizza Ordering System 1.0, this vulnerability poses a risk of unauthorized access to customer order data, potentially including personal and payment information. Exploitation could lead to data breaches, loss of customer trust, and regulatory non-compliance under GDPR due to exposure of personal data. Additionally, attackers might alter order data or disrupt service availability, impacting business operations and revenue. Small and medium-sized food service businesses, which often rely on such specialized ordering systems, may lack robust cybersecurity defenses, increasing their vulnerability. The public release of exploit code raises the likelihood of opportunistic attacks, including automated scanning and exploitation by cybercriminals. The impact extends beyond data loss to potential reputational damage and financial penalties. Organizations may also face operational disruptions if attackers manipulate order processing or database integrity. Given the interconnected nature of supply chains in the food industry, a successful attack could have cascading effects on partners and customers across Europe.
Mitigation Recommendations
Immediate mitigation should focus on reviewing and updating the /listorder.php script to implement strict input validation and sanitization for the ID parameter. Developers should refactor the code to use prepared statements or parameterized queries to eliminate SQL injection vectors. In the absence of an official patch, organizations can apply web application firewalls (WAFs) with custom rules to detect and block malicious SQL injection attempts targeting the ID parameter. Monitoring and logging of web application traffic should be enhanced to detect suspicious activities. Organizations should conduct security assessments and penetration testing on their deployment of the Simple Pizza Ordering System to identify and remediate similar vulnerabilities. Backup procedures should be verified to ensure data integrity in case of compromise. Additionally, restricting database user privileges to the minimum necessary can limit the impact of a successful injection. Finally, organizations should stay alert for vendor updates or patches and apply them promptly once released.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-17T16:48:59.085Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 691bb966d4c3ef3c7a511605
Added to database: 11/18/2025, 12:10:14 AM
Last enriched: 11/25/2025, 1:07:29 AM
Last updated: 1/7/2026, 6:08:21 AM
Views: 70
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14835: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in opajaap WP Photo Album Plus
HighCVE-2026-0650: CWE-306 Missing Authentication for Critical Function in OpenFlagr Flagr
CriticalCVE-2025-15474: CWE-770 Allocation of Resources Without Limits or Throttling in AuntyFey AuntyFey Smart Combination Lock
MediumCVE-2025-14468: CWE-352 Cross-Site Request Forgery (CSRF) in mohammed_kaludi AMP for WP – Accelerated Mobile Pages
MediumCVE-2025-9611: CWE-749 Exposed Dangerous Method or Function in Microsoft Playwright
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.