CVE-2025-5980: SQL Injection in code-projects Restaurant Order System

Medium
VulnerabilityCVE-2025-5980cvecve-2025-5980
Published: Tue Jun 10 2025 (06/10/2025, 21:00:11 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Restaurant Order System

Description

A vulnerability classified as critical was found in code-projects Restaurant Order System 1.0. This vulnerability affects unknown code of the file /order.php. The manipulation of the argument tabidNoti leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 06/10/2025, 21:23:15 UTC

Technical Analysis

CVE-2025-5980 is a critical SQL Injection vulnerability identified in version 1.0 of the code-projects Restaurant Order System, specifically within the /order.php file. The vulnerability arises from improper sanitization or validation of the 'tabidNoti' parameter, which an attacker can manipulate remotely without requiring authentication or user interaction. This allows the attacker to inject malicious SQL queries directly into the backend database. The injection can lead to unauthorized data access, modification, or deletion, compromising the confidentiality, integrity, and availability of the system's data. The vulnerability has a CVSS 4.0 base score of 6.9, indicating a medium severity level, with an attack vector of network (remote), low attack complexity, no privileges or user interaction required, and partial impact on confidentiality, integrity, and availability. Although no public exploits are currently known in the wild, the vulnerability details have been publicly disclosed, increasing the risk of exploitation. The affected product is a restaurant order management system, which typically handles sensitive customer and order data, making the impact of exploitation significant for affected organizations.

Potential Impact

For European organizations using the code-projects Restaurant Order System 1.0, exploitation of this SQL Injection vulnerability could result in unauthorized access to sensitive customer information, order details, and potentially payment data if stored within the system. This could lead to data breaches, regulatory non-compliance (e.g., GDPR violations), financial losses, and reputational damage. Additionally, attackers could manipulate or delete order data, disrupting business operations and causing service outages. The remote and unauthenticated nature of the exploit increases the risk of widespread attacks, especially for small to medium-sized restaurants that may lack robust cybersecurity defenses. The impact extends beyond data compromise to operational disruption, which can be critical in the hospitality sector where timely order processing is essential.

Mitigation Recommendations

1. Immediate patching or upgrading to a fixed version of the Restaurant Order System is the most effective mitigation; however, no patch links are currently available, so organizations should contact the vendor for updates. 2. Implement Web Application Firewalls (WAFs) with custom rules to detect and block SQL Injection attempts targeting the 'tabidNoti' parameter. 3. Employ input validation and sanitization at the application level, ensuring that all user-supplied inputs, especially 'tabidNoti', are properly escaped or parameterized to prevent injection. 4. Conduct regular security assessments and code reviews focusing on SQL Injection vulnerabilities. 5. Restrict database user permissions to the minimum necessary to limit the impact of a successful injection. 6. Monitor logs for unusual database queries or errors related to the 'tabidNoti' parameter to detect potential exploitation attempts early. 7. For organizations unable to immediately patch, consider isolating the affected system from external networks or limiting access to trusted IP addresses to reduce exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-06-10T11:51:35.268Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6848a2383cd93dcca8310c6d

Added to database: 6/10/2025, 9:23:04 PM

Last enriched: 6/10/2025, 9:23:15 PM

Last updated: 6/12/2025, 7:48:39 AM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats