CVE-2025-4491: SQL Injection in Campcodes Online Food Ordering System
A vulnerability classified as critical was found in Campcodes Online Food Ordering System 1.0. This vulnerability affects unknown code of the file /routers/ticket-status.php. The manipulation of the argument ticket_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-4491 is a critical SQL Injection vulnerability identified in version 1.0 of the Campcodes Online Food Ordering System. The vulnerability exists in the /routers/ticket-status.php file, specifically through the manipulation of the 'ticket_id' parameter. An attacker can remotely exploit this flaw without any authentication or user interaction, by injecting malicious SQL code into the 'ticket_id' argument. This can lead to unauthorized access, modification, or deletion of database information, potentially compromising the confidentiality, integrity, and availability of the system's data. The vulnerability is classified with a CVSS 4.0 base score of 6.9, indicating a medium severity level, primarily due to limited impact on confidentiality, integrity, and availability (all rated low to limited). No privileges or user interaction are required, and the attack vector is network-based, making exploitation feasible remotely. Although no public exploits are currently known to be in the wild, the disclosure of the vulnerability increases the risk of exploitation. The lack of available patches or mitigations from the vendor further exacerbates the threat landscape for users of this software.
Potential Impact
For European organizations utilizing the Campcodes Online Food Ordering System 1.0, this vulnerability poses a significant risk to their operational security and customer data privacy. Exploitation could lead to unauthorized data access, including customer order information, payment details, or internal ticketing data, potentially resulting in data breaches and regulatory non-compliance under GDPR. The integrity of order processing could be compromised, leading to fraudulent orders or denial of service conditions affecting business continuity. Given the critical nature of food ordering systems in retail and hospitality sectors, disruption could impact customer trust and revenue. Additionally, compromised systems could be leveraged as pivot points for broader network intrusion. The medium CVSS score suggests limited but tangible impact, but the ease of exploitation without authentication raises concern for rapid spread among vulnerable deployments.
Mitigation Recommendations
Organizations should immediately audit their deployments of Campcodes Online Food Ordering System to identify any instances of version 1.0. Until an official patch is released, it is critical to implement web application firewall (WAF) rules specifically targeting SQL injection attempts on the 'ticket_id' parameter in /routers/ticket-status.php. Input validation and parameterized queries should be enforced if source code access is available. Network segmentation and strict access controls should limit exposure of the affected system to untrusted networks. Monitoring and logging of database queries and web requests should be enhanced to detect anomalous activities indicative of exploitation attempts. Organizations should also prepare incident response plans for potential data breaches stemming from this vulnerability. Engaging with the vendor for timely patch releases and updates is essential. If feasible, migrating to alternative food ordering platforms with better security postures should be considered.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden
CVE-2025-4491: SQL Injection in Campcodes Online Food Ordering System
Description
A vulnerability classified as critical was found in Campcodes Online Food Ordering System 1.0. This vulnerability affects unknown code of the file /routers/ticket-status.php. The manipulation of the argument ticket_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-4491 is a critical SQL Injection vulnerability identified in version 1.0 of the Campcodes Online Food Ordering System. The vulnerability exists in the /routers/ticket-status.php file, specifically through the manipulation of the 'ticket_id' parameter. An attacker can remotely exploit this flaw without any authentication or user interaction, by injecting malicious SQL code into the 'ticket_id' argument. This can lead to unauthorized access, modification, or deletion of database information, potentially compromising the confidentiality, integrity, and availability of the system's data. The vulnerability is classified with a CVSS 4.0 base score of 6.9, indicating a medium severity level, primarily due to limited impact on confidentiality, integrity, and availability (all rated low to limited). No privileges or user interaction are required, and the attack vector is network-based, making exploitation feasible remotely. Although no public exploits are currently known to be in the wild, the disclosure of the vulnerability increases the risk of exploitation. The lack of available patches or mitigations from the vendor further exacerbates the threat landscape for users of this software.
Potential Impact
For European organizations utilizing the Campcodes Online Food Ordering System 1.0, this vulnerability poses a significant risk to their operational security and customer data privacy. Exploitation could lead to unauthorized data access, including customer order information, payment details, or internal ticketing data, potentially resulting in data breaches and regulatory non-compliance under GDPR. The integrity of order processing could be compromised, leading to fraudulent orders or denial of service conditions affecting business continuity. Given the critical nature of food ordering systems in retail and hospitality sectors, disruption could impact customer trust and revenue. Additionally, compromised systems could be leveraged as pivot points for broader network intrusion. The medium CVSS score suggests limited but tangible impact, but the ease of exploitation without authentication raises concern for rapid spread among vulnerable deployments.
Mitigation Recommendations
Organizations should immediately audit their deployments of Campcodes Online Food Ordering System to identify any instances of version 1.0. Until an official patch is released, it is critical to implement web application firewall (WAF) rules specifically targeting SQL injection attempts on the 'ticket_id' parameter in /routers/ticket-status.php. Input validation and parameterized queries should be enforced if source code access is available. Network segmentation and strict access controls should limit exposure of the affected system to untrusted networks. Monitoring and logging of database queries and web requests should be enhanced to detect anomalous activities indicative of exploitation attempts. Organizations should also prepare incident response plans for potential data breaches stemming from this vulnerability. Engaging with the vendor for timely patch releases and updates is essential. If feasible, migrating to alternative food ordering platforms with better security postures should be considered.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-05-09T12:02:22.313Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682d9817c4522896dcbd7301
Added to database: 5/21/2025, 9:08:39 AM
Last enriched: 7/4/2025, 11:27:55 PM
Last updated: 8/1/2025, 6:52:05 AM
Views: 11
Related Threats
CVE-2025-53606: CWE-502 Deserialization of Untrusted Data in Apache Software Foundation Apache Seata (incubating)
CriticalCVE-2025-48913: CWE-20 Improper Input Validation in Apache Software Foundation Apache CXF
HighCVE-2025-6572: CWE-79 Cross-Site Scripting (XSS) in OpenStreetMap for Gutenberg and WPBakery Page Builder (formerly Visual Composer)
HighCVE-2025-54959: Improper limitation of a pathname to a restricted directory ('Path Traversal') in Mubit co.,ltd. Powered BLUE 870
MediumCVE-2025-54958: Improper neutralization of special elements used in an OS command ('OS Command Injection') in Mubit co.,ltd. Powered BLUE 870
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.