CVE-2025-6360: SQL Injection in code-projects Simple Pizza Ordering System
A vulnerability classified as critical has been found in code-projects Simple Pizza Ordering System 1.0. This affects an unknown part of the file /portal.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-6360 is a critical SQL Injection vulnerability identified in version 1.0 of the code-projects Simple Pizza Ordering System, specifically within the /portal.php file. The vulnerability arises from improper sanitization or validation of the 'ID' parameter, which an attacker can manipulate remotely without authentication or user interaction. This allows the attacker to inject malicious SQL queries directly into the backend database. Exploiting this flaw can lead to unauthorized data access, modification, or deletion, potentially compromising the confidentiality, integrity, and availability of the system's data. The vulnerability has a CVSS 4.0 base score of 6.9, categorized as medium severity, reflecting its network attack vector, low attack complexity, and no required privileges or user interaction. Although no known exploits are currently observed in the wild, the public disclosure of the exploit code increases the risk of exploitation. The affected product is a niche web-based pizza ordering system, likely deployed by small to medium-sized food service businesses. The vulnerability's exploitation could allow attackers to extract sensitive customer data, manipulate orders, or disrupt service operations, impacting business continuity and customer trust.
Potential Impact
For European organizations, especially small and medium enterprises (SMEs) in the food service sector using the Simple Pizza Ordering System, this vulnerability poses a significant risk. Successful exploitation could lead to unauthorized access to customer personal data, including payment information if stored, violating GDPR regulations and resulting in legal and financial penalties. Data integrity could be compromised by altering orders or menu information, leading to operational disruptions and reputational damage. Availability may also be affected if attackers execute destructive SQL commands, causing service outages. Given the remote and unauthenticated nature of the attack, the threat surface is broad, potentially affecting any exposed installations. The medium CVSS score indicates moderate but tangible risk, emphasizing the need for timely remediation to prevent data breaches and service interruptions.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately implement input validation and parameterized queries (prepared statements) in the /portal.php file to prevent SQL injection attacks. Since no official patch is currently available, developers should review and refactor the code handling the 'ID' parameter to ensure strict type checking and sanitization. Deploying a Web Application Firewall (WAF) with SQL injection detection rules can provide an additional protective layer by blocking malicious payloads targeting the vulnerable endpoint. Regularly monitoring web server logs for suspicious query patterns related to the 'ID' parameter can help detect attempted exploits early. Organizations should also conduct security audits and penetration testing focused on injection flaws. Finally, isolating the affected system within the network and restricting external access until remediation is complete can reduce exposure.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland
CVE-2025-6360: SQL Injection in code-projects Simple Pizza Ordering System
Description
A vulnerability classified as critical has been found in code-projects Simple Pizza Ordering System 1.0. This affects an unknown part of the file /portal.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-6360 is a critical SQL Injection vulnerability identified in version 1.0 of the code-projects Simple Pizza Ordering System, specifically within the /portal.php file. The vulnerability arises from improper sanitization or validation of the 'ID' parameter, which an attacker can manipulate remotely without authentication or user interaction. This allows the attacker to inject malicious SQL queries directly into the backend database. Exploiting this flaw can lead to unauthorized data access, modification, or deletion, potentially compromising the confidentiality, integrity, and availability of the system's data. The vulnerability has a CVSS 4.0 base score of 6.9, categorized as medium severity, reflecting its network attack vector, low attack complexity, and no required privileges or user interaction. Although no known exploits are currently observed in the wild, the public disclosure of the exploit code increases the risk of exploitation. The affected product is a niche web-based pizza ordering system, likely deployed by small to medium-sized food service businesses. The vulnerability's exploitation could allow attackers to extract sensitive customer data, manipulate orders, or disrupt service operations, impacting business continuity and customer trust.
Potential Impact
For European organizations, especially small and medium enterprises (SMEs) in the food service sector using the Simple Pizza Ordering System, this vulnerability poses a significant risk. Successful exploitation could lead to unauthorized access to customer personal data, including payment information if stored, violating GDPR regulations and resulting in legal and financial penalties. Data integrity could be compromised by altering orders or menu information, leading to operational disruptions and reputational damage. Availability may also be affected if attackers execute destructive SQL commands, causing service outages. Given the remote and unauthenticated nature of the attack, the threat surface is broad, potentially affecting any exposed installations. The medium CVSS score indicates moderate but tangible risk, emphasizing the need for timely remediation to prevent data breaches and service interruptions.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately implement input validation and parameterized queries (prepared statements) in the /portal.php file to prevent SQL injection attacks. Since no official patch is currently available, developers should review and refactor the code handling the 'ID' parameter to ensure strict type checking and sanitization. Deploying a Web Application Firewall (WAF) with SQL injection detection rules can provide an additional protective layer by blocking malicious payloads targeting the vulnerable endpoint. Regularly monitoring web server logs for suspicious query patterns related to the 'ID' parameter can help detect attempted exploits early. Organizations should also conduct security audits and penetration testing focused on injection flaws. Finally, isolating the affected system within the network and restricting external access until remediation is complete can reduce exposure.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-06-19T13:21:55.633Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68568e81aded773421b5a7fd
Added to database: 6/21/2025, 10:50:41 AM
Last enriched: 6/21/2025, 12:51:45 PM
Last updated: 8/9/2025, 2:57:08 PM
Views: 27
Related Threats
CVE-2025-8975: Cross Site Scripting in givanz Vvveb
MediumCVE-2025-55716: CWE-862 Missing Authorization in VeronaLabs WP Statistics
MediumCVE-2025-55714: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Crocoblock JetElements For Elementor
MediumCVE-2025-55713: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in CreativeThemes Blocksy
MediumCVE-2025-55712: CWE-862 Missing Authorization in POSIMYTH The Plus Addons for Elementor Page Builder Lite
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.