Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15073: SQL Injection in itsourcecode Online Frozen Foods Ordering System

0
Medium
VulnerabilityCVE-2025-15073cvecve-2025-15073
Published: Wed Dec 24 2025 (12/24/2025, 23:02:07 UTC)
Source: CVE Database V5
Vendor/Project: itsourcecode
Product: Online Frozen Foods Ordering System

Description

A vulnerability was determined in itsourcecode Online Frozen Foods Ordering System 1.0. This affects an unknown part of the file /contact_us.php. This manipulation of the argument Name causes sql injection. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 22:28:48 UTC

Technical Analysis

The vulnerability identified as CVE-2025-15073 affects the itsourcecode Online Frozen Foods Ordering System version 1.0. It is a classic SQL Injection flaw located in the /contact_us.php script, where the 'Name' parameter is improperly sanitized, allowing attackers to inject malicious SQL commands. This injection can be performed remotely without authentication or user interaction, making it highly accessible to attackers. The flaw can lead to unauthorized data access, data modification, or potentially full compromise of the backend database. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Despite the medium severity rating, the absence of patches and public disclosure increases the urgency for mitigation. The vulnerability does not involve scope change or security requirements changes, but the ease of exploitation and potential data exposure make it a significant risk for affected deployments. No known exploits have been reported in the wild yet, but the public availability of details may lead to exploitation attempts.

Potential Impact

Organizations using the vulnerable version of the itsourcecode Online Frozen Foods Ordering System risk unauthorized access to sensitive customer data, including contact information submitted via the contact form. Attackers could manipulate SQL queries to extract, modify, or delete database records, potentially leading to data breaches, loss of data integrity, and disruption of ordering services. This could result in reputational damage, regulatory penalties, and financial losses. Since the vulnerability allows remote exploitation without authentication, attackers can launch automated attacks at scale. The impact is particularly critical for businesses relying on this system for customer interaction and order processing, as it may compromise both operational continuity and customer trust.

Mitigation Recommendations

Immediate mitigation should focus on implementing robust input validation and sanitization for all user-supplied data, especially the 'Name' parameter in /contact_us.php. Developers should refactor the code to use parameterized queries or prepared statements to prevent SQL injection. In the absence of an official patch, organizations can deploy Web Application Firewalls (WAFs) with rules targeting SQL injection patterns to block malicious requests. Regularly monitoring database logs for unusual queries and access patterns can help detect exploitation attempts early. Additionally, organizations should conduct code audits and penetration testing to identify similar vulnerabilities. Updating to a patched version once available is critical. Backup strategies should be reviewed to ensure data recovery in case of compromise. Educating developers on secure coding practices will help prevent recurrence.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-24T16:48:17.013Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 694c7418585daa086f41f356

Added to database: 12/24/2025, 11:15:36 PM

Last enriched: 2/24/2026, 10:28:48 PM

Last updated: 3/25/2026, 2:35:28 AM

Views: 81

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses