CVE-2025-4506: SQL Injection in Campcodes Online Food Ordering System
A vulnerability was found in Campcodes Online Food Ordering System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /routers/menu-router.php. The manipulation of the argument 1_price leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-4506 is a critical SQL Injection vulnerability identified in version 1.0 of the Campcodes Online Food Ordering System. The flaw exists in the /routers/menu-router.php file, specifically through the manipulation of the '1_price' argument. This vulnerability allows an unauthenticated attacker to remotely inject malicious SQL code into the backend database queries. Because the attack vector requires no authentication or user interaction, it can be exploited over the network by sending specially crafted requests to the affected endpoint. The injection can lead to unauthorized data access, modification, or deletion, potentially compromising the confidentiality, integrity, and availability of the system's data. Although the CVSS 4.0 base score is 6.9 (medium severity), the lack of authentication and remote exploitability elevate the risk. The vulnerability affects only version 1.0 of the product, and no official patches have been published yet. No known exploits are currently observed in the wild, but public disclosure increases the likelihood of exploitation attempts. The vulnerability's impact is primarily on the backend database and the integrity of the food ordering system's operations, which could disrupt business processes and expose sensitive customer or business data.
Potential Impact
For European organizations using Campcodes Online Food Ordering System 1.0, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to customer data, including order details and potentially payment information if stored insecurely, resulting in privacy violations under GDPR. Data integrity could be compromised, leading to incorrect orders or manipulated menu pricing, damaging customer trust and operational reliability. Availability of the ordering system could be disrupted through destructive SQL commands, impacting business continuity and revenue. Given the critical nature of food service operations and the increasing reliance on online ordering, such disruptions could have cascading effects on customer satisfaction and regulatory compliance. Additionally, data breaches could result in financial penalties and reputational damage under European data protection laws.
Mitigation Recommendations
Immediate mitigation steps include implementing input validation and parameterized queries or prepared statements to prevent SQL injection in the affected '1_price' parameter. Organizations should conduct a thorough code review of the /routers/menu-router.php file and related components to identify and remediate unsafe database query constructions. Until an official patch is released, deploying a Web Application Firewall (WAF) with custom rules to detect and block SQL injection patterns targeting the '1_price' parameter can reduce exposure. Monitoring web server logs for suspicious requests and unusual database errors can help detect exploitation attempts early. Organizations should also consider isolating the affected system from critical internal networks and restrict access to the ordering system to trusted IP ranges where feasible. Finally, planning for an upgrade or patch deployment once available is essential to fully remediate the vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2025-4506: SQL Injection in Campcodes Online Food Ordering System
Description
A vulnerability was found in Campcodes Online Food Ordering System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /routers/menu-router.php. The manipulation of the argument 1_price leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-4506 is a critical SQL Injection vulnerability identified in version 1.0 of the Campcodes Online Food Ordering System. The flaw exists in the /routers/menu-router.php file, specifically through the manipulation of the '1_price' argument. This vulnerability allows an unauthenticated attacker to remotely inject malicious SQL code into the backend database queries. Because the attack vector requires no authentication or user interaction, it can be exploited over the network by sending specially crafted requests to the affected endpoint. The injection can lead to unauthorized data access, modification, or deletion, potentially compromising the confidentiality, integrity, and availability of the system's data. Although the CVSS 4.0 base score is 6.9 (medium severity), the lack of authentication and remote exploitability elevate the risk. The vulnerability affects only version 1.0 of the product, and no official patches have been published yet. No known exploits are currently observed in the wild, but public disclosure increases the likelihood of exploitation attempts. The vulnerability's impact is primarily on the backend database and the integrity of the food ordering system's operations, which could disrupt business processes and expose sensitive customer or business data.
Potential Impact
For European organizations using Campcodes Online Food Ordering System 1.0, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to customer data, including order details and potentially payment information if stored insecurely, resulting in privacy violations under GDPR. Data integrity could be compromised, leading to incorrect orders or manipulated menu pricing, damaging customer trust and operational reliability. Availability of the ordering system could be disrupted through destructive SQL commands, impacting business continuity and revenue. Given the critical nature of food service operations and the increasing reliance on online ordering, such disruptions could have cascading effects on customer satisfaction and regulatory compliance. Additionally, data breaches could result in financial penalties and reputational damage under European data protection laws.
Mitigation Recommendations
Immediate mitigation steps include implementing input validation and parameterized queries or prepared statements to prevent SQL injection in the affected '1_price' parameter. Organizations should conduct a thorough code review of the /routers/menu-router.php file and related components to identify and remediate unsafe database query constructions. Until an official patch is released, deploying a Web Application Firewall (WAF) with custom rules to detect and block SQL injection patterns targeting the '1_price' parameter can reduce exposure. Monitoring web server logs for suspicious requests and unusual database errors can help detect exploitation attempts early. Organizations should also consider isolating the affected system from critical internal networks and restrict access to the ordering system to trusted IP ranges where feasible. Finally, planning for an upgrade or patch deployment once available is essential to fully remediate the vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-05-09T12:59:06.856Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682d9816c4522896dcbd6b2f
Added to database: 5/21/2025, 9:08:38 AM
Last enriched: 7/12/2025, 3:34:40 AM
Last updated: 7/29/2025, 7:29:36 PM
Views: 11
Related Threats
CVE-2025-9027: SQL Injection in code-projects Online Medicine Guide
MediumCVE-2025-9026: OS Command Injection in D-Link DIR-860L
MediumCVE-2025-9025: SQL Injection in code-projects Simple Cafe Ordering System
MediumCVE-2025-9024: SQL Injection in PHPGurukul Beauty Parlour Management System
MediumCVE-2025-9023: Buffer Overflow in Tenda AC7
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.