Skip to main content

CVE-2025-6361: SQL Injection in code-projects Simple Pizza Ordering System

Medium
VulnerabilityCVE-2025-6361cvecve-2025-6361
Published: Fri Jun 20 2025 (06/20/2025, 19:31:04 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Simple Pizza Ordering System

Description

A vulnerability classified as critical was found in code-projects Simple Pizza Ordering System 1.0. This vulnerability affects unknown code of the file /adds.php. The manipulation of the argument userid leads to sql injection. The attack can be initiated remotely.

AI-Powered Analysis

AILast updated: 06/21/2025, 12:51:29 UTC

Technical Analysis

CVE-2025-6361 is a critical SQL Injection vulnerability identified in version 1.0 of the Simple Pizza Ordering System developed by code-projects. The vulnerability exists in the /adds.php file, specifically through the manipulation of the 'userid' parameter. This flaw allows an unauthenticated attacker to remotely inject malicious SQL queries into the backend database. Exploiting this vulnerability can lead to unauthorized access to sensitive data, modification or deletion of database records, and potentially full compromise of the underlying database server. The vulnerability is remotely exploitable without requiring any authentication or user interaction, increasing its risk profile. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the ease of exploitation (network attack vector, low attack complexity, no privileges or user interaction required) but limited impact on confidentiality, integrity, and availability (each rated low). No known exploits are currently reported in the wild, and no patches or mitigations have been officially released yet. The lack of authentication and direct database manipulation capability makes this vulnerability a significant threat to any deployment of this software, especially in environments handling sensitive customer or payment information. The vulnerability's presence in a niche application like a pizza ordering system may limit its widespread impact but does not diminish the risk to affected organizations.

Potential Impact

For European organizations using the Simple Pizza Ordering System 1.0, this vulnerability poses a risk of data breaches involving customer information, order details, and potentially payment data if stored in the same database. Exploitation could result in unauthorized data disclosure, data tampering, and disruption of order processing services, impacting business operations and customer trust. Given the remote and unauthenticated nature of the attack, threat actors could leverage this vulnerability to pivot into broader network compromise, especially if the ordering system is integrated with other internal systems. The impact is particularly critical for small to medium-sized enterprises (SMEs) in the food service sector that may lack robust cybersecurity defenses. Additionally, regulatory compliance risks arise under GDPR due to potential exposure of personal data. While the vulnerability currently lacks known exploits in the wild, the ease of exploitation and critical nature of SQL injection vulnerabilities warrant proactive mitigation to prevent future attacks.

Mitigation Recommendations

1. Immediate code review and sanitization of the 'userid' parameter in /adds.php to implement parameterized queries or prepared statements, eliminating direct SQL query concatenation. 2. Apply input validation and use whitelist filtering to restrict acceptable input formats for 'userid'. 3. Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the vulnerable endpoint. 4. Isolate the Simple Pizza Ordering System from critical internal networks to limit lateral movement if compromised. 5. Monitor database logs and web server logs for suspicious query patterns or anomalous access attempts related to 'userid'. 6. Plan for an urgent patch or upgrade from the vendor once available; in the interim, consider disabling or restricting access to the vulnerable functionality if feasible. 7. Conduct security awareness training for staff managing the system to recognize signs of exploitation and respond promptly. 8. Regularly back up databases and test restoration procedures to minimize impact in case of data corruption or deletion.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-06-19T13:21:58.444Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68568e81aded773421b5a812

Added to database: 6/21/2025, 10:50:41 AM

Last enriched: 6/21/2025, 12:51:29 PM

Last updated: 8/19/2025, 7:40:19 AM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats