Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13571: SQL Injection in code-projects Simple Food Ordering System

0
Medium
VulnerabilityCVE-2025-13571cvecve-2025-13571
Published: Sun Nov 23 2025 (11/23/2025, 22:02:05 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Simple Food Ordering System

Description

A vulnerability was determined in code-projects Simple Food Ordering System 1.0. Affected by this issue is some unknown functionality of the file /listorder.php. Executing manipulation of the argument ID can lead to sql injection. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized.

AI-Powered Analysis

AILast updated: 11/23/2025, 22:20:47 UTC

Technical Analysis

CVE-2025-13571 identifies a SQL Injection vulnerability in the Simple Food Ordering System version 1.0 developed by code-projects. The flaw exists in the /listorder.php script where the 'ID' parameter is not properly sanitized or validated before being used in SQL queries. This allows an unauthenticated remote attacker to inject malicious SQL code by manipulating the 'ID' argument, potentially enabling unauthorized access to the backend database. The vulnerability does not require user interaction or authentication, which lowers the barrier for exploitation. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L but likely a typo or low privilege), no user interaction (UI:N), and low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although no known exploits are currently active in the wild, the public disclosure increases the risk of exploitation. The vulnerability could allow attackers to extract sensitive order data, modify or delete records, or escalate privileges within the application. The absence of patches or vendor advisories necessitates immediate mitigation by users. The vulnerability is typical of insufficient input validation and lack of parameterized queries, common issues in web applications handling user inputs.

Potential Impact

For European organizations, particularly those in the food service, hospitality, and small to medium enterprise sectors using the affected Simple Food Ordering System, this vulnerability poses a risk of data breaches involving customer orders, payment information, and business operations data. Exploitation could lead to unauthorized data disclosure, data manipulation, or denial of service, undermining customer trust and potentially violating GDPR requirements regarding data protection. The medium severity reflects limited but tangible risks to confidentiality, integrity, and availability. Given the remote exploitability without authentication, attackers could target multiple organizations en masse. Disruption of order processing systems could impact business continuity and revenue. Additionally, compromised systems could serve as pivot points for broader network intrusion. The lack of known exploits currently reduces immediate risk but does not eliminate it, especially as exploit code may emerge following public disclosure.

Mitigation Recommendations

Organizations should immediately audit their use of the Simple Food Ordering System version 1.0 and isolate affected instances. Since no official patches are available, implement the following mitigations: 1) Apply strict input validation and sanitization on the 'ID' parameter in /listorder.php to reject malicious input patterns. 2) Refactor database queries to use parameterized prepared statements or stored procedures to prevent SQL injection. 3) Restrict database user privileges to the minimum necessary, avoiding excessive rights that could be exploited. 4) Monitor web application logs for suspicious query patterns or repeated attempts to manipulate the 'ID' parameter. 5) Employ Web Application Firewalls (WAFs) with rules targeting SQL injection attempts to provide an additional protective layer. 6) Consider migrating to updated or alternative food ordering systems with active security support. 7) Conduct security awareness training for developers and administrators on secure coding practices. 8) Regularly back up databases and test restoration procedures to mitigate data loss risks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-22T19:13:37.322Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 692388afec5d308f09c843f6

Added to database: 11/23/2025, 10:20:31 PM

Last enriched: 11/23/2025, 10:20:47 PM

Last updated: 11/24/2025, 3:17:43 PM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats