Skip to main content

CVE-2025-4506: SQL Injection in Campcodes Online Food Ordering System

Medium
VulnerabilityCVE-2025-4506cvecve-2025-4506
Published: Sat May 10 2025 (05/10/2025, 16:00:08 UTC)
Source: CVE
Vendor/Project: Campcodes
Product: Online Food Ordering System

Description

A vulnerability was found in Campcodes Online Food Ordering System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /routers/menu-router.php. The manipulation of the argument 1_price leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/12/2025, 03:34:40 UTC

Technical Analysis

CVE-2025-4506 is a critical SQL Injection vulnerability identified in version 1.0 of the Campcodes Online Food Ordering System. The flaw exists in the /routers/menu-router.php file, specifically through the manipulation of the '1_price' argument. This vulnerability allows an unauthenticated attacker to remotely inject malicious SQL code into the backend database queries. Because the attack vector requires no authentication or user interaction, it can be exploited over the network by sending specially crafted requests to the affected endpoint. The injection can lead to unauthorized data access, modification, or deletion, potentially compromising the confidentiality, integrity, and availability of the system's data. Although the CVSS 4.0 base score is 6.9 (medium severity), the lack of authentication and remote exploitability elevate the risk. The vulnerability affects only version 1.0 of the product, and no official patches have been published yet. No known exploits are currently observed in the wild, but public disclosure increases the likelihood of exploitation attempts. The vulnerability's impact is primarily on the backend database and the integrity of the food ordering system's operations, which could disrupt business processes and expose sensitive customer or business data.

Potential Impact

For European organizations using Campcodes Online Food Ordering System 1.0, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to customer data, including order details and potentially payment information if stored insecurely, resulting in privacy violations under GDPR. Data integrity could be compromised, leading to incorrect orders or manipulated menu pricing, damaging customer trust and operational reliability. Availability of the ordering system could be disrupted through destructive SQL commands, impacting business continuity and revenue. Given the critical nature of food service operations and the increasing reliance on online ordering, such disruptions could have cascading effects on customer satisfaction and regulatory compliance. Additionally, data breaches could result in financial penalties and reputational damage under European data protection laws.

Mitigation Recommendations

Immediate mitigation steps include implementing input validation and parameterized queries or prepared statements to prevent SQL injection in the affected '1_price' parameter. Organizations should conduct a thorough code review of the /routers/menu-router.php file and related components to identify and remediate unsafe database query constructions. Until an official patch is released, deploying a Web Application Firewall (WAF) with custom rules to detect and block SQL injection patterns targeting the '1_price' parameter can reduce exposure. Monitoring web server logs for suspicious requests and unusual database errors can help detect exploitation attempts early. Organizations should also consider isolating the affected system from critical internal networks and restrict access to the ordering system to trusted IP ranges where feasible. Finally, planning for an upgrade or patch deployment once available is essential to fully remediate the vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-05-09T12:59:06.856Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682d9816c4522896dcbd6b2f

Added to database: 5/21/2025, 9:08:38 AM

Last enriched: 7/12/2025, 3:34:40 AM

Last updated: 7/29/2025, 7:29:36 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats