Skip to main content

CVE-2025-4491: SQL Injection in Campcodes Online Food Ordering System

Medium
VulnerabilityCVE-2025-4491cvecve-2025-4491
Published: Fri May 09 2025 (05/09/2025, 21:00:10 UTC)
Source: CVE
Vendor/Project: Campcodes
Product: Online Food Ordering System

Description

A vulnerability classified as critical was found in Campcodes Online Food Ordering System 1.0. This vulnerability affects unknown code of the file /routers/ticket-status.php. The manipulation of the argument ticket_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/04/2025, 23:27:55 UTC

Technical Analysis

CVE-2025-4491 is a critical SQL Injection vulnerability identified in version 1.0 of the Campcodes Online Food Ordering System. The vulnerability exists in the /routers/ticket-status.php file, specifically through the manipulation of the 'ticket_id' parameter. An attacker can remotely exploit this flaw without any authentication or user interaction, by injecting malicious SQL code into the 'ticket_id' argument. This can lead to unauthorized access, modification, or deletion of database information, potentially compromising the confidentiality, integrity, and availability of the system's data. The vulnerability is classified with a CVSS 4.0 base score of 6.9, indicating a medium severity level, primarily due to limited impact on confidentiality, integrity, and availability (all rated low to limited). No privileges or user interaction are required, and the attack vector is network-based, making exploitation feasible remotely. Although no public exploits are currently known to be in the wild, the disclosure of the vulnerability increases the risk of exploitation. The lack of available patches or mitigations from the vendor further exacerbates the threat landscape for users of this software.

Potential Impact

For European organizations utilizing the Campcodes Online Food Ordering System 1.0, this vulnerability poses a significant risk to their operational security and customer data privacy. Exploitation could lead to unauthorized data access, including customer order information, payment details, or internal ticketing data, potentially resulting in data breaches and regulatory non-compliance under GDPR. The integrity of order processing could be compromised, leading to fraudulent orders or denial of service conditions affecting business continuity. Given the critical nature of food ordering systems in retail and hospitality sectors, disruption could impact customer trust and revenue. Additionally, compromised systems could be leveraged as pivot points for broader network intrusion. The medium CVSS score suggests limited but tangible impact, but the ease of exploitation without authentication raises concern for rapid spread among vulnerable deployments.

Mitigation Recommendations

Organizations should immediately audit their deployments of Campcodes Online Food Ordering System to identify any instances of version 1.0. Until an official patch is released, it is critical to implement web application firewall (WAF) rules specifically targeting SQL injection attempts on the 'ticket_id' parameter in /routers/ticket-status.php. Input validation and parameterized queries should be enforced if source code access is available. Network segmentation and strict access controls should limit exposure of the affected system to untrusted networks. Monitoring and logging of database queries and web requests should be enhanced to detect anomalous activities indicative of exploitation attempts. Organizations should also prepare incident response plans for potential data breaches stemming from this vulnerability. Engaging with the vendor for timely patch releases and updates is essential. If feasible, migrating to alternative food ordering platforms with better security postures should be considered.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-05-09T12:02:22.313Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682d9817c4522896dcbd7301

Added to database: 5/21/2025, 9:08:39 AM

Last enriched: 7/4/2025, 11:27:55 PM

Last updated: 8/1/2025, 6:52:05 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats