Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14250: SQL Injection in code-projects Online Ordering System

0
Medium
VulnerabilityCVE-2025-14250cvecve-2025-14250
Published: Mon Dec 08 2025 (12/08/2025, 15:32:07 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Online Ordering System

Description

A weakness has been identified in code-projects Online Ordering System 1.0. The impacted element is an unknown function of the file /user_contact.php. This manipulation of the argument Name causes sql injection. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited.

AI-Powered Analysis

AILast updated: 12/08/2025, 15:40:45 UTC

Technical Analysis

CVE-2025-14250 identifies a SQL Injection vulnerability in the code-projects Online Ordering System version 1.0, specifically in an unspecified function within the /user_contact.php file. The vulnerability arises from improper sanitization of the 'Name' parameter, which can be manipulated remotely without any authentication or user interaction, allowing an attacker to inject malicious SQL code. This can lead to unauthorized access to the backend database, potentially exposing sensitive customer data or enabling data manipulation. The CVSS 4.0 vector indicates the attack is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and has partial impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). The exploit code has been publicly disclosed, increasing the likelihood of exploitation. No official patches or fixes have been released yet, leaving systems vulnerable. The vulnerability affects only version 1.0 of the product, which may still be in use by some organizations. Given the nature of online ordering systems, exploitation could result in data breaches, fraud, or disruption of order processing. The lack of authentication requirement and ease of exploitation make this a significant risk for affected deployments.

Potential Impact

For European organizations using the code-projects Online Ordering System 1.0, this vulnerability poses a risk of unauthorized access to customer and transactional data, potentially leading to data breaches and loss of customer trust. Attackers could manipulate orders, extract sensitive personal or payment information, or corrupt database records, impacting business operations and compliance with GDPR. The public availability of exploit code increases the risk of automated attacks and widespread exploitation. Disruption of ordering services could affect revenue and operational continuity. Organizations in sectors with high online transaction volumes, such as retail and food delivery, are particularly vulnerable. The medium severity rating reflects partial but meaningful impacts on confidentiality, integrity, and availability, which are critical for maintaining secure e-commerce environments.

Mitigation Recommendations

1. Immediately implement input validation and sanitization on all parameters, especially the 'Name' parameter in /user_contact.php, to prevent injection of malicious SQL code. 2. Refactor database queries to use parameterized statements or prepared statements to eliminate direct concatenation of user input into SQL queries. 3. Conduct a thorough code review of the entire application to identify and remediate any other potential injection points. 4. Deploy Web Application Firewalls (WAFs) with rules specifically designed to detect and block SQL Injection attempts targeting this vulnerability. 5. Monitor logs for unusual database queries or error messages indicative of injection attempts. 6. Isolate and restrict database user permissions to minimize the impact of any successful injection. 7. Engage with the vendor or community to obtain patches or updates as soon as they become available. 8. Educate development and security teams on secure coding practices to prevent similar vulnerabilities in future releases. 9. If immediate patching is not possible, consider temporary mitigations such as disabling the vulnerable functionality or restricting access to trusted IPs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-08T06:04:31.753Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6936f16d3bff8e51097ebcf9

Added to database: 12/8/2025, 3:40:29 PM

Last enriched: 12/8/2025, 3:40:45 PM

Last updated: 12/9/2025, 10:56:17 PM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats