CVE-2025-4506: SQL Injection in Campcodes Online Food Ordering System
A vulnerability was found in Campcodes Online Food Ordering System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /routers/menu-router.php. The manipulation of the argument 1_price leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-4506 is a critical SQL Injection vulnerability identified in version 1.0 of the Campcodes Online Food Ordering System. The flaw exists in the /routers/menu-router.php file, specifically through the manipulation of the '1_price' argument. This vulnerability allows an unauthenticated attacker to remotely inject malicious SQL code into the backend database queries. Because the attack vector requires no authentication or user interaction, it can be exploited over the network by sending specially crafted requests to the affected endpoint. The injection can lead to unauthorized data access, modification, or deletion, potentially compromising the confidentiality, integrity, and availability of the system's data. Although the CVSS 4.0 base score is 6.9 (medium severity), the lack of authentication and remote exploitability elevate the risk. The vulnerability affects only version 1.0 of the product, and no official patches have been published yet. No known exploits are currently observed in the wild, but public disclosure increases the likelihood of exploitation attempts. The vulnerability's impact is primarily on the backend database and the integrity of the food ordering system's operations, which could disrupt business processes and expose sensitive customer or business data.
Potential Impact
For European organizations using Campcodes Online Food Ordering System 1.0, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to customer data, including order details and potentially payment information if stored insecurely, resulting in privacy violations under GDPR. Data integrity could be compromised, leading to incorrect orders or manipulated menu pricing, damaging customer trust and operational reliability. Availability of the ordering system could be disrupted through destructive SQL commands, impacting business continuity and revenue. Given the critical nature of food service operations and the increasing reliance on online ordering, such disruptions could have cascading effects on customer satisfaction and regulatory compliance. Additionally, data breaches could result in financial penalties and reputational damage under European data protection laws.
Mitigation Recommendations
Immediate mitigation steps include implementing input validation and parameterized queries or prepared statements to prevent SQL injection in the affected '1_price' parameter. Organizations should conduct a thorough code review of the /routers/menu-router.php file and related components to identify and remediate unsafe database query constructions. Until an official patch is released, deploying a Web Application Firewall (WAF) with custom rules to detect and block SQL injection patterns targeting the '1_price' parameter can reduce exposure. Monitoring web server logs for suspicious requests and unusual database errors can help detect exploitation attempts early. Organizations should also consider isolating the affected system from critical internal networks and restrict access to the ordering system to trusted IP ranges where feasible. Finally, planning for an upgrade or patch deployment once available is essential to fully remediate the vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2025-4506: SQL Injection in Campcodes Online Food Ordering System
Description
A vulnerability was found in Campcodes Online Food Ordering System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /routers/menu-router.php. The manipulation of the argument 1_price leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-4506 is a critical SQL Injection vulnerability identified in version 1.0 of the Campcodes Online Food Ordering System. The flaw exists in the /routers/menu-router.php file, specifically through the manipulation of the '1_price' argument. This vulnerability allows an unauthenticated attacker to remotely inject malicious SQL code into the backend database queries. Because the attack vector requires no authentication or user interaction, it can be exploited over the network by sending specially crafted requests to the affected endpoint. The injection can lead to unauthorized data access, modification, or deletion, potentially compromising the confidentiality, integrity, and availability of the system's data. Although the CVSS 4.0 base score is 6.9 (medium severity), the lack of authentication and remote exploitability elevate the risk. The vulnerability affects only version 1.0 of the product, and no official patches have been published yet. No known exploits are currently observed in the wild, but public disclosure increases the likelihood of exploitation attempts. The vulnerability's impact is primarily on the backend database and the integrity of the food ordering system's operations, which could disrupt business processes and expose sensitive customer or business data.
Potential Impact
For European organizations using Campcodes Online Food Ordering System 1.0, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to customer data, including order details and potentially payment information if stored insecurely, resulting in privacy violations under GDPR. Data integrity could be compromised, leading to incorrect orders or manipulated menu pricing, damaging customer trust and operational reliability. Availability of the ordering system could be disrupted through destructive SQL commands, impacting business continuity and revenue. Given the critical nature of food service operations and the increasing reliance on online ordering, such disruptions could have cascading effects on customer satisfaction and regulatory compliance. Additionally, data breaches could result in financial penalties and reputational damage under European data protection laws.
Mitigation Recommendations
Immediate mitigation steps include implementing input validation and parameterized queries or prepared statements to prevent SQL injection in the affected '1_price' parameter. Organizations should conduct a thorough code review of the /routers/menu-router.php file and related components to identify and remediate unsafe database query constructions. Until an official patch is released, deploying a Web Application Firewall (WAF) with custom rules to detect and block SQL injection patterns targeting the '1_price' parameter can reduce exposure. Monitoring web server logs for suspicious requests and unusual database errors can help detect exploitation attempts early. Organizations should also consider isolating the affected system from critical internal networks and restrict access to the ordering system to trusted IP ranges where feasible. Finally, planning for an upgrade or patch deployment once available is essential to fully remediate the vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-05-09T12:59:06.856Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682d9816c4522896dcbd6b2f
Added to database: 5/21/2025, 9:08:38 AM
Last enriched: 7/12/2025, 3:34:40 AM
Last updated: 11/22/2025, 7:34:37 PM
Views: 30
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
China-Linked APT31 Launches Stealthy Cyberattacks on Russian IT Using Cloud Services
MediumCVE-2025-2655: SQL Injection in SourceCodester AC Repair and Services System
MediumCVE-2023-30806: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Sangfor Net-Gen Application Firewall
CriticalCVE-2024-0401: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in ASUS ExpertWiFi
HighCVE-2024-23690: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Netgear FVS336Gv3
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.