Skip to main content

CVE-2025-6362: SQL Injection in code-projects Simple Pizza Ordering System

Medium
VulnerabilityCVE-2025-6362cvecve-2025-6362
Published: Fri Jun 20 2025 (06/20/2025, 19:31:06 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Simple Pizza Ordering System

Description

A vulnerability, which was classified as critical, has been found in code-projects Simple Pizza Ordering System 1.0. This issue affects some unknown processing of the file /editpro.php. The manipulation of the argument ID leads to sql injection. The attack may be initiated remotely.

AI-Powered Analysis

AILast updated: 06/21/2025, 12:51:20 UTC

Technical Analysis

CVE-2025-6362 is a critical SQL Injection vulnerability identified in version 1.0 of the code-projects Simple Pizza Ordering System, specifically within the /editpro.php file. The vulnerability arises due to improper sanitization or validation of the 'ID' parameter, which is used in SQL queries. An attacker can remotely manipulate this parameter to inject malicious SQL code, potentially allowing unauthorized access to the backend database. This could lead to unauthorized data disclosure, data modification, or even complete compromise of the database server. The vulnerability does not require any authentication or user interaction, making it exploitable remotely by any attacker with network access to the affected system. The CVSS 4.0 base score is 6.9, categorized as medium severity, reflecting the ease of exploitation (network accessible, no privileges required) but limited impact on confidentiality, integrity, and availability (each rated low). No known exploits are currently reported in the wild, and no patches have been published yet. The vulnerability affects only version 1.0 of the Simple Pizza Ordering System, which is a niche product likely used by small to medium-sized businesses in the food ordering sector. The absence of supply chain or third-party dependencies reduces the scope but does not eliminate risk for affected deployments.

Potential Impact

For European organizations using the Simple Pizza Ordering System 1.0, this vulnerability poses a significant risk of unauthorized database access. Potential impacts include leakage of customer data, order information, and possibly payment details if stored in the database. Data integrity could be compromised by unauthorized modification or deletion of orders, leading to operational disruption and financial loss. Availability impact is limited but could occur if the attacker executes destructive SQL commands. Given the remote and unauthenticated nature of the exploit, attackers could leverage this vulnerability to gain a foothold in the network, potentially pivoting to other systems. Small and medium enterprises in the food service sector, which may rely on this software for online ordering, are particularly vulnerable. The reputational damage and regulatory consequences under GDPR for data breaches could be substantial. However, the limited market penetration of this specific product in Europe and the lack of known exploits reduce the immediate widespread threat level.

Mitigation Recommendations

1. Immediate code review and patching of the /editpro.php file to implement proper input validation and parameterized queries (prepared statements) for the 'ID' parameter to prevent SQL injection. 2. Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the vulnerable endpoint until a patch is available. 3. Conduct thorough security testing, including automated and manual penetration testing, focusing on all input vectors in the application. 4. Restrict network access to the application backend, limiting exposure to trusted IP ranges where feasible. 5. Monitor database logs and application logs for suspicious queries or anomalies indicative of exploitation attempts. 6. Educate staff on incident response procedures specific to web application attacks. 7. Plan for immediate deployment of vendor patches once released and maintain an inventory of affected systems to prioritize remediation. 8. Consider migrating to alternative, actively maintained ordering systems with better security track records if patching is delayed or unavailable.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-06-19T13:22:01.819Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68568e81aded773421b5a819

Added to database: 6/21/2025, 10:50:41 AM

Last enriched: 6/21/2025, 12:51:20 PM

Last updated: 8/11/2025, 10:10:14 AM

Views: 23

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats