Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13323: SQL Injection in code-projects Simple Pizza Ordering System

0
Medium
VulnerabilityCVE-2025-13323cvecve-2025-13323
Published: Tue Nov 18 2025 (11/18/2025, 00:02:09 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Simple Pizza Ordering System

Description

A security flaw has been discovered in code-projects Simple Pizza Ordering System 1.0. Affected is an unknown function of the file /listorder.php. Performing manipulation of the argument ID results in sql injection. The attack can be initiated remotely. The exploit has been released to the public and may be exploited.

AI-Powered Analysis

AILast updated: 11/25/2025, 01:07:29 UTC

Technical Analysis

CVE-2025-13323 identifies a SQL Injection vulnerability in the Simple Pizza Ordering System version 1.0 developed by code-projects. The vulnerability resides in the /listorder.php file, where the ID parameter is improperly sanitized, allowing an attacker to inject malicious SQL code remotely without requiring authentication or user interaction. This flaw can be exploited by manipulating the ID argument to execute arbitrary SQL commands on the backend database, potentially leading to unauthorized data disclosure, data modification, or disruption of service. The CVSS 4.0 score of 6.9 reflects a medium severity, considering the attack vector is network-based with low attack complexity and no privileges or user interaction needed. The impact on confidentiality, integrity, and availability is limited but non-negligible, as the vulnerability allows partial compromise of these security properties. Although no known exploits are currently active in the wild, the public availability of exploit code increases the risk of exploitation. The lack of official patches or updates at the time of publication necessitates immediate mitigation efforts by users of this software. The vulnerability is significant for organizations relying on this ordering system, especially those handling sensitive customer data or payment information. The technical root cause is the absence of proper input validation and the failure to use parameterized queries or prepared statements in the affected PHP script. Remediation involves code correction to sanitize inputs and prevent SQL injection vectors.

Potential Impact

For European organizations using the Simple Pizza Ordering System 1.0, this vulnerability poses a risk of unauthorized access to customer order data, potentially including personal and payment information. Exploitation could lead to data breaches, loss of customer trust, and regulatory non-compliance under GDPR due to exposure of personal data. Additionally, attackers might alter order data or disrupt service availability, impacting business operations and revenue. Small and medium-sized food service businesses, which often rely on such specialized ordering systems, may lack robust cybersecurity defenses, increasing their vulnerability. The public release of exploit code raises the likelihood of opportunistic attacks, including automated scanning and exploitation by cybercriminals. The impact extends beyond data loss to potential reputational damage and financial penalties. Organizations may also face operational disruptions if attackers manipulate order processing or database integrity. Given the interconnected nature of supply chains in the food industry, a successful attack could have cascading effects on partners and customers across Europe.

Mitigation Recommendations

Immediate mitigation should focus on reviewing and updating the /listorder.php script to implement strict input validation and sanitization for the ID parameter. Developers should refactor the code to use prepared statements or parameterized queries to eliminate SQL injection vectors. In the absence of an official patch, organizations can apply web application firewalls (WAFs) with custom rules to detect and block malicious SQL injection attempts targeting the ID parameter. Monitoring and logging of web application traffic should be enhanced to detect suspicious activities. Organizations should conduct security assessments and penetration testing on their deployment of the Simple Pizza Ordering System to identify and remediate similar vulnerabilities. Backup procedures should be verified to ensure data integrity in case of compromise. Additionally, restricting database user privileges to the minimum necessary can limit the impact of a successful injection. Finally, organizations should stay alert for vendor updates or patches and apply them promptly once released.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-17T16:48:59.085Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691bb966d4c3ef3c7a511605

Added to database: 11/18/2025, 12:10:14 AM

Last enriched: 11/25/2025, 1:07:29 AM

Last updated: 1/7/2026, 6:08:21 AM

Views: 70

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats