CVE-2025-4936: SQL Injection in projectworlds Online Food Ordering System
A vulnerability was found in projectworlds Online Food Ordering System 1.0. It has been classified as critical. Affected is an unknown function of the file /admin-page.php. The manipulation of the argument 1_price leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-4936 is a SQL Injection vulnerability identified in version 1.0 of the projectworlds Online Food Ordering System, specifically within the /admin-page.php file. The vulnerability arises from improper sanitization or validation of the '1_price' parameter, which can be manipulated by an attacker to inject malicious SQL code. This flaw allows an unauthenticated remote attacker to execute arbitrary SQL commands on the backend database without requiring any user interaction or privileges. The injection can lead to unauthorized data access, modification, or deletion, potentially compromising the confidentiality, integrity, and availability of the system's data. The vulnerability has been publicly disclosed, increasing the risk of exploitation, although no known active exploits have been reported in the wild yet. The CVSS 4.0 base score is 6.9, categorized as medium severity, reflecting the ease of remote exploitation without authentication but with limited impact on confidentiality, integrity, and availability (low impact in these areas). The vulnerability affects a critical component of the online food ordering system's administrative interface, which typically controls order management, pricing, and possibly user data, making it a significant risk if exploited.
Potential Impact
For European organizations using the projectworlds Online Food Ordering System version 1.0, this vulnerability poses a substantial risk. Exploitation could lead to unauthorized disclosure of sensitive customer data, manipulation of order pricing, or disruption of order processing, damaging business operations and customer trust. Given the critical role of online food ordering platforms in the hospitality and retail sectors, exploitation could result in financial losses, regulatory penalties under GDPR for data breaches, and reputational damage. The ability to exploit this vulnerability remotely without authentication increases the attack surface, especially for organizations with publicly accessible administrative interfaces. Additionally, attackers could leverage this vulnerability as a foothold to pivot into internal networks, potentially compromising broader IT infrastructure. The impact is particularly relevant for small to medium enterprises that may lack robust security controls or timely patching processes.
Mitigation Recommendations
Organizations should immediately restrict access to the /admin-page.php interface by implementing network-level controls such as IP whitelisting or VPN access to limit exposure to trusted personnel only. Input validation and parameter sanitization must be enforced at the application level to prevent SQL injection, ideally by using prepared statements or parameterized queries. Since no official patches are currently available, organizations should consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block malicious payloads targeting the '1_price' parameter. Regular security audits and code reviews should be conducted to identify and remediate similar injection flaws. Monitoring and logging of database queries and administrative actions can help detect exploitation attempts early. Finally, organizations should plan to upgrade to a patched version once released or consider alternative solutions with better security track records.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland
CVE-2025-4936: SQL Injection in projectworlds Online Food Ordering System
Description
A vulnerability was found in projectworlds Online Food Ordering System 1.0. It has been classified as critical. Affected is an unknown function of the file /admin-page.php. The manipulation of the argument 1_price leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-4936 is a SQL Injection vulnerability identified in version 1.0 of the projectworlds Online Food Ordering System, specifically within the /admin-page.php file. The vulnerability arises from improper sanitization or validation of the '1_price' parameter, which can be manipulated by an attacker to inject malicious SQL code. This flaw allows an unauthenticated remote attacker to execute arbitrary SQL commands on the backend database without requiring any user interaction or privileges. The injection can lead to unauthorized data access, modification, or deletion, potentially compromising the confidentiality, integrity, and availability of the system's data. The vulnerability has been publicly disclosed, increasing the risk of exploitation, although no known active exploits have been reported in the wild yet. The CVSS 4.0 base score is 6.9, categorized as medium severity, reflecting the ease of remote exploitation without authentication but with limited impact on confidentiality, integrity, and availability (low impact in these areas). The vulnerability affects a critical component of the online food ordering system's administrative interface, which typically controls order management, pricing, and possibly user data, making it a significant risk if exploited.
Potential Impact
For European organizations using the projectworlds Online Food Ordering System version 1.0, this vulnerability poses a substantial risk. Exploitation could lead to unauthorized disclosure of sensitive customer data, manipulation of order pricing, or disruption of order processing, damaging business operations and customer trust. Given the critical role of online food ordering platforms in the hospitality and retail sectors, exploitation could result in financial losses, regulatory penalties under GDPR for data breaches, and reputational damage. The ability to exploit this vulnerability remotely without authentication increases the attack surface, especially for organizations with publicly accessible administrative interfaces. Additionally, attackers could leverage this vulnerability as a foothold to pivot into internal networks, potentially compromising broader IT infrastructure. The impact is particularly relevant for small to medium enterprises that may lack robust security controls or timely patching processes.
Mitigation Recommendations
Organizations should immediately restrict access to the /admin-page.php interface by implementing network-level controls such as IP whitelisting or VPN access to limit exposure to trusted personnel only. Input validation and parameter sanitization must be enforced at the application level to prevent SQL injection, ideally by using prepared statements or parameterized queries. Since no official patches are currently available, organizations should consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block malicious payloads targeting the '1_price' parameter. Regular security audits and code reviews should be conducted to identify and remediate similar injection flaws. Monitoring and logging of database queries and administrative actions can help detect exploitation attempts early. Finally, organizations should plan to upgrade to a patched version once released or consider alternative solutions with better security track records.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-05-18T12:27:24.350Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682cd0f81484d88663aeb6da
Added to database: 5/20/2025, 6:59:04 PM
Last enriched: 7/11/2025, 7:16:38 PM
Last updated: 7/30/2025, 4:07:43 PM
Views: 15
Related Threats
CVE-2025-8435: Missing Authorization in code-projects Online Movie Streaming
MediumCVE-2025-7845: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in jetmonsters Stratum – Elementor Widgets
MediumCVE-2025-7725: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in contest-gallery Photos, Files, YouTube, Twitter, Instagram, TikTok, Ecommerce Contest Gallery – Upload, Vote, Sell via PayPal or Stripe, Social Share Buttons, OpenAI
HighCVE-2025-7443: CWE-434 Unrestricted Upload of File with Dangerous Type in berqwp BerqWP – Automated All-In-One Page Speed Optimization for Core Web Vitals, Cache, CDN, Images, CSS, and JavaScript
HighCVE-2025-4523: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in themeatelier IDonate – Blood Donation, Request And Donor Management System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.