CVE-2025-4507: SQL Injection in Campcodes Online Food Ordering System
A vulnerability classified as critical has been found in Campcodes Online Food Ordering System 1.0. This affects an unknown part of the file /routers/add-item.php. The manipulation of the argument price leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-4507 is a SQL Injection vulnerability identified in version 1.0 of the Campcodes Online Food Ordering System, specifically within the /routers/add-item.php file. The vulnerability arises from improper sanitization or validation of the 'price' parameter, which can be manipulated by an attacker to inject malicious SQL code. This flaw allows an unauthenticated remote attacker to execute arbitrary SQL commands on the backend database without requiring any user interaction or privileges. The vulnerability has been publicly disclosed, increasing the risk of exploitation, although no known active exploits have been reported in the wild yet. The CVSS 4.0 base score is 6.9, indicating a medium severity level, reflecting the ease of remote exploitation without authentication and the potential for limited impact on confidentiality, integrity, and availability. The vulnerability does not require user interaction and affects the confidentiality, integrity, and availability of the system to a limited extent, as indicated by the CVSS vector. The lack of a patch or mitigation guidance from the vendor at this time increases the urgency for organizations to implement compensating controls. Given the nature of the vulnerability, attackers could potentially extract sensitive customer data, modify order details, or disrupt the ordering process, impacting business operations and customer trust.
Potential Impact
For European organizations using the Campcodes Online Food Ordering System version 1.0, this vulnerability poses a significant risk to the confidentiality and integrity of customer and transactional data. Exploitation could lead to unauthorized access to sensitive information such as customer details, payment information, and order histories. Additionally, attackers could alter order data or disrupt service availability, leading to operational downtime and reputational damage. Given the critical role of online food ordering platforms in the hospitality and retail sectors, successful exploitation could result in financial losses, regulatory non-compliance (e.g., GDPR violations due to data breaches), and erosion of customer trust. The remote and unauthenticated nature of the attack vector increases the likelihood of exploitation, especially in environments where the system is exposed to the internet without adequate network segmentation or web application firewalls. The medium severity rating suggests that while the impact is serious, it may not lead to full system compromise but still warrants immediate attention to prevent data leakage and service disruption.
Mitigation Recommendations
European organizations should prioritize the following specific mitigation steps: 1) Immediate code review and sanitization of the 'price' parameter in /routers/add-item.php to ensure proper input validation and use of parameterized queries or prepared statements to prevent SQL injection. 2) Implement Web Application Firewalls (WAFs) with rules specifically designed to detect and block SQL injection attempts targeting the vulnerable endpoint. 3) Restrict direct internet exposure of the online food ordering system by placing it behind secure network segments and VPNs where feasible. 4) Monitor application logs and database query logs for unusual or suspicious activity indicative of SQL injection attempts. 5) Conduct penetration testing focused on injection flaws to identify any other potential injection points. 6) Engage with the vendor for timely patches or updates and apply them as soon as they become available. 7) Educate development and IT teams on secure coding practices to prevent similar vulnerabilities in future releases. 8) Ensure regular backups of databases and application data to enable rapid recovery in case of data corruption or loss due to exploitation.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden
CVE-2025-4507: SQL Injection in Campcodes Online Food Ordering System
Description
A vulnerability classified as critical has been found in Campcodes Online Food Ordering System 1.0. This affects an unknown part of the file /routers/add-item.php. The manipulation of the argument price leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-4507 is a SQL Injection vulnerability identified in version 1.0 of the Campcodes Online Food Ordering System, specifically within the /routers/add-item.php file. The vulnerability arises from improper sanitization or validation of the 'price' parameter, which can be manipulated by an attacker to inject malicious SQL code. This flaw allows an unauthenticated remote attacker to execute arbitrary SQL commands on the backend database without requiring any user interaction or privileges. The vulnerability has been publicly disclosed, increasing the risk of exploitation, although no known active exploits have been reported in the wild yet. The CVSS 4.0 base score is 6.9, indicating a medium severity level, reflecting the ease of remote exploitation without authentication and the potential for limited impact on confidentiality, integrity, and availability. The vulnerability does not require user interaction and affects the confidentiality, integrity, and availability of the system to a limited extent, as indicated by the CVSS vector. The lack of a patch or mitigation guidance from the vendor at this time increases the urgency for organizations to implement compensating controls. Given the nature of the vulnerability, attackers could potentially extract sensitive customer data, modify order details, or disrupt the ordering process, impacting business operations and customer trust.
Potential Impact
For European organizations using the Campcodes Online Food Ordering System version 1.0, this vulnerability poses a significant risk to the confidentiality and integrity of customer and transactional data. Exploitation could lead to unauthorized access to sensitive information such as customer details, payment information, and order histories. Additionally, attackers could alter order data or disrupt service availability, leading to operational downtime and reputational damage. Given the critical role of online food ordering platforms in the hospitality and retail sectors, successful exploitation could result in financial losses, regulatory non-compliance (e.g., GDPR violations due to data breaches), and erosion of customer trust. The remote and unauthenticated nature of the attack vector increases the likelihood of exploitation, especially in environments where the system is exposed to the internet without adequate network segmentation or web application firewalls. The medium severity rating suggests that while the impact is serious, it may not lead to full system compromise but still warrants immediate attention to prevent data leakage and service disruption.
Mitigation Recommendations
European organizations should prioritize the following specific mitigation steps: 1) Immediate code review and sanitization of the 'price' parameter in /routers/add-item.php to ensure proper input validation and use of parameterized queries or prepared statements to prevent SQL injection. 2) Implement Web Application Firewalls (WAFs) with rules specifically designed to detect and block SQL injection attempts targeting the vulnerable endpoint. 3) Restrict direct internet exposure of the online food ordering system by placing it behind secure network segments and VPNs where feasible. 4) Monitor application logs and database query logs for unusual or suspicious activity indicative of SQL injection attempts. 5) Conduct penetration testing focused on injection flaws to identify any other potential injection points. 6) Engage with the vendor for timely patches or updates and apply them as soon as they become available. 7) Educate development and IT teams on secure coding practices to prevent similar vulnerabilities in future releases. 8) Ensure regular backups of databases and application data to enable rapid recovery in case of data corruption or loss due to exploitation.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-05-09T12:59:37.504Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682d9816c4522896dcbd6e32
Added to database: 5/21/2025, 9:08:38 AM
Last enriched: 7/12/2025, 4:17:13 AM
Last updated: 1/7/2026, 8:54:34 AM
Views: 57
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15158: CWE-434 Unrestricted Upload of File with Dangerous Type in eastsidecode WP Enable WebP
HighCVE-2025-15018: CWE-639 Authorization Bypass Through User-Controlled Key in djanym Optional Email
CriticalCVE-2025-15000: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tfrommen Page Keys
MediumCVE-2025-14999: CWE-352 Cross-Site Request Forgery (CSRF) in kentothemes Latest Tabs
MediumCVE-2025-13531: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in hayyatapps Stylish Order Form Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.