CVE-2025-13571: SQL Injection in code-projects Simple Food Ordering System
A vulnerability was determined in code-projects Simple Food Ordering System 1.0. Affected by this issue is some unknown functionality of the file /listorder.php. Executing manipulation of the argument ID can lead to sql injection. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized.
AI Analysis
Technical Summary
CVE-2025-13571 identifies a SQL Injection vulnerability in the Simple Food Ordering System version 1.0 developed by code-projects. The flaw exists in the /listorder.php script where the 'ID' parameter is not properly sanitized or validated before being used in SQL queries. This allows an unauthenticated remote attacker to inject malicious SQL code by manipulating the 'ID' argument, potentially enabling unauthorized access to the backend database. The vulnerability does not require user interaction or authentication, which lowers the barrier for exploitation. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L but likely a typo or low privilege), no user interaction (UI:N), and low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although no known exploits are currently active in the wild, the public disclosure increases the risk of exploitation. The vulnerability could allow attackers to extract sensitive order data, modify or delete records, or escalate privileges within the application. The absence of patches or vendor advisories necessitates immediate mitigation by users. The vulnerability is typical of insufficient input validation and lack of parameterized queries, common issues in web applications handling user inputs.
Potential Impact
For European organizations, particularly those in the food service, hospitality, and small to medium enterprise sectors using the affected Simple Food Ordering System, this vulnerability poses a risk of data breaches involving customer orders, payment information, and business operations data. Exploitation could lead to unauthorized data disclosure, data manipulation, or denial of service, undermining customer trust and potentially violating GDPR requirements regarding data protection. The medium severity reflects limited but tangible risks to confidentiality, integrity, and availability. Given the remote exploitability without authentication, attackers could target multiple organizations en masse. Disruption of order processing systems could impact business continuity and revenue. Additionally, compromised systems could serve as pivot points for broader network intrusion. The lack of known exploits currently reduces immediate risk but does not eliminate it, especially as exploit code may emerge following public disclosure.
Mitigation Recommendations
Organizations should immediately audit their use of the Simple Food Ordering System version 1.0 and isolate affected instances. Since no official patches are available, implement the following mitigations: 1) Apply strict input validation and sanitization on the 'ID' parameter in /listorder.php to reject malicious input patterns. 2) Refactor database queries to use parameterized prepared statements or stored procedures to prevent SQL injection. 3) Restrict database user privileges to the minimum necessary, avoiding excessive rights that could be exploited. 4) Monitor web application logs for suspicious query patterns or repeated attempts to manipulate the 'ID' parameter. 5) Employ Web Application Firewalls (WAFs) with rules targeting SQL injection attempts to provide an additional protective layer. 6) Consider migrating to updated or alternative food ordering systems with active security support. 7) Conduct security awareness training for developers and administrators on secure coding practices. 8) Regularly back up databases and test restoration procedures to mitigate data loss risks.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Netherlands, Belgium
CVE-2025-13571: SQL Injection in code-projects Simple Food Ordering System
Description
A vulnerability was determined in code-projects Simple Food Ordering System 1.0. Affected by this issue is some unknown functionality of the file /listorder.php. Executing manipulation of the argument ID can lead to sql injection. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized.
AI-Powered Analysis
Technical Analysis
CVE-2025-13571 identifies a SQL Injection vulnerability in the Simple Food Ordering System version 1.0 developed by code-projects. The flaw exists in the /listorder.php script where the 'ID' parameter is not properly sanitized or validated before being used in SQL queries. This allows an unauthenticated remote attacker to inject malicious SQL code by manipulating the 'ID' argument, potentially enabling unauthorized access to the backend database. The vulnerability does not require user interaction or authentication, which lowers the barrier for exploitation. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L but likely a typo or low privilege), no user interaction (UI:N), and low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although no known exploits are currently active in the wild, the public disclosure increases the risk of exploitation. The vulnerability could allow attackers to extract sensitive order data, modify or delete records, or escalate privileges within the application. The absence of patches or vendor advisories necessitates immediate mitigation by users. The vulnerability is typical of insufficient input validation and lack of parameterized queries, common issues in web applications handling user inputs.
Potential Impact
For European organizations, particularly those in the food service, hospitality, and small to medium enterprise sectors using the affected Simple Food Ordering System, this vulnerability poses a risk of data breaches involving customer orders, payment information, and business operations data. Exploitation could lead to unauthorized data disclosure, data manipulation, or denial of service, undermining customer trust and potentially violating GDPR requirements regarding data protection. The medium severity reflects limited but tangible risks to confidentiality, integrity, and availability. Given the remote exploitability without authentication, attackers could target multiple organizations en masse. Disruption of order processing systems could impact business continuity and revenue. Additionally, compromised systems could serve as pivot points for broader network intrusion. The lack of known exploits currently reduces immediate risk but does not eliminate it, especially as exploit code may emerge following public disclosure.
Mitigation Recommendations
Organizations should immediately audit their use of the Simple Food Ordering System version 1.0 and isolate affected instances. Since no official patches are available, implement the following mitigations: 1) Apply strict input validation and sanitization on the 'ID' parameter in /listorder.php to reject malicious input patterns. 2) Refactor database queries to use parameterized prepared statements or stored procedures to prevent SQL injection. 3) Restrict database user privileges to the minimum necessary, avoiding excessive rights that could be exploited. 4) Monitor web application logs for suspicious query patterns or repeated attempts to manipulate the 'ID' parameter. 5) Employ Web Application Firewalls (WAFs) with rules targeting SQL injection attempts to provide an additional protective layer. 6) Consider migrating to updated or alternative food ordering systems with active security support. 7) Conduct security awareness training for developers and administrators on secure coding practices. 8) Regularly back up databases and test restoration procedures to mitigate data loss risks.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-22T19:13:37.322Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 692388afec5d308f09c843f6
Added to database: 11/23/2025, 10:20:31 PM
Last enriched: 11/23/2025, 10:20:47 PM
Last updated: 11/24/2025, 3:17:43 PM
Views: 16
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13541
LowCVE-2025-13598
LowCVE-2025-11921: CWE-732 Incorrect Permission Assignment for Critical Resource in Bjango iStats
CriticalSecond Sha1-Hulud Wave Affects 25,000+ Repositories via npm Preinstall Credential Theft
MediumCVE-2025-65503: n/a
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.