CVE-2025-8018: SQL Injection in code-projects Food Ordering Review System
A vulnerability was found in code-projects Food Ordering Review System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /user/reservation_page.php. The manipulation of the argument reg_Id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.
AI Analysis
Technical Summary
CVE-2025-8018 is a SQL Injection vulnerability identified in version 1.0 of the code-projects Food Ordering Review System, specifically within the /user/reservation_page.php file. The vulnerability arises from improper sanitization or validation of the 'reg_Id' parameter, which an attacker can manipulate to inject arbitrary SQL commands. This injection flaw allows remote attackers to execute unauthorized SQL queries on the backend database without requiring user interaction or authentication, as indicated by the CVSS vector. The vulnerability may also affect other parameters, increasing the attack surface. Exploitation could lead to unauthorized data access, modification, or deletion, potentially compromising the confidentiality, integrity, and availability of the system's data. Although the CVSS 4.0 base score is 5.3 (medium severity), reflecting limited impact on confidentiality, integrity, and availability (all low), the ease of remote exploitation without authentication elevates the risk. No official patches have been linked yet, and no known exploits are reported in the wild, but public disclosure of the exploit code increases the likelihood of future attacks. The vulnerability's presence in a food ordering and review platform means that customer data, reservation details, and potentially payment or personal information could be exposed or manipulated, impacting business operations and customer trust.
Potential Impact
For European organizations using the affected Food Ordering Review System 1.0, this vulnerability poses a tangible risk to customer data privacy and business continuity. Exploitation could lead to unauthorized access to sensitive customer information, including reservation details and possibly personal identifiers, which would violate GDPR regulations and result in significant legal and financial penalties. The integrity of reservation data could be compromised, leading to operational disruptions such as incorrect bookings or denial of service to legitimate customers. Additionally, attackers could leverage the SQL injection to pivot within the network or extract credentials, increasing the scope of the breach. The reputational damage from a publicized data breach in the hospitality or food service sector could be severe, impacting customer loyalty and market position. Given the remote and unauthenticated nature of the exploit, attackers can target these systems at scale, increasing the risk for European businesses relying on this software without timely mitigation.
Mitigation Recommendations
European organizations should immediately audit their deployment of the code-projects Food Ordering Review System to identify if version 1.0 is in use. Since no official patches are currently available, organizations should implement the following specific mitigations: 1) Apply Web Application Firewall (WAF) rules tailored to detect and block SQL injection attempts targeting the 'reg_Id' parameter and other input fields on /user/reservation_page.php. 2) Employ parameterized queries or prepared statements in the application code to prevent injection if source code access and modification are possible. 3) Conduct thorough input validation and sanitization on all user-supplied data, especially parameters related to reservations and user input. 4) Restrict database user permissions to the minimum necessary to limit the impact of a successful injection. 5) Monitor logs for unusual database query patterns or errors indicative of injection attempts. 6) Consider isolating the affected system within the network to limit lateral movement. 7) Plan for an upgrade or replacement of the vulnerable software version once a patch or secure alternative is available. 8) Educate IT and security teams about the vulnerability and ensure incident response plans are updated to handle potential exploitation.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden
CVE-2025-8018: SQL Injection in code-projects Food Ordering Review System
Description
A vulnerability was found in code-projects Food Ordering Review System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /user/reservation_page.php. The manipulation of the argument reg_Id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.
AI-Powered Analysis
Technical Analysis
CVE-2025-8018 is a SQL Injection vulnerability identified in version 1.0 of the code-projects Food Ordering Review System, specifically within the /user/reservation_page.php file. The vulnerability arises from improper sanitization or validation of the 'reg_Id' parameter, which an attacker can manipulate to inject arbitrary SQL commands. This injection flaw allows remote attackers to execute unauthorized SQL queries on the backend database without requiring user interaction or authentication, as indicated by the CVSS vector. The vulnerability may also affect other parameters, increasing the attack surface. Exploitation could lead to unauthorized data access, modification, or deletion, potentially compromising the confidentiality, integrity, and availability of the system's data. Although the CVSS 4.0 base score is 5.3 (medium severity), reflecting limited impact on confidentiality, integrity, and availability (all low), the ease of remote exploitation without authentication elevates the risk. No official patches have been linked yet, and no known exploits are reported in the wild, but public disclosure of the exploit code increases the likelihood of future attacks. The vulnerability's presence in a food ordering and review platform means that customer data, reservation details, and potentially payment or personal information could be exposed or manipulated, impacting business operations and customer trust.
Potential Impact
For European organizations using the affected Food Ordering Review System 1.0, this vulnerability poses a tangible risk to customer data privacy and business continuity. Exploitation could lead to unauthorized access to sensitive customer information, including reservation details and possibly personal identifiers, which would violate GDPR regulations and result in significant legal and financial penalties. The integrity of reservation data could be compromised, leading to operational disruptions such as incorrect bookings or denial of service to legitimate customers. Additionally, attackers could leverage the SQL injection to pivot within the network or extract credentials, increasing the scope of the breach. The reputational damage from a publicized data breach in the hospitality or food service sector could be severe, impacting customer loyalty and market position. Given the remote and unauthenticated nature of the exploit, attackers can target these systems at scale, increasing the risk for European businesses relying on this software without timely mitigation.
Mitigation Recommendations
European organizations should immediately audit their deployment of the code-projects Food Ordering Review System to identify if version 1.0 is in use. Since no official patches are currently available, organizations should implement the following specific mitigations: 1) Apply Web Application Firewall (WAF) rules tailored to detect and block SQL injection attempts targeting the 'reg_Id' parameter and other input fields on /user/reservation_page.php. 2) Employ parameterized queries or prepared statements in the application code to prevent injection if source code access and modification are possible. 3) Conduct thorough input validation and sanitization on all user-supplied data, especially parameters related to reservations and user input. 4) Restrict database user permissions to the minimum necessary to limit the impact of a successful injection. 5) Monitor logs for unusual database query patterns or errors indicative of injection attempts. 6) Consider isolating the affected system within the network to limit lateral movement. 7) Plan for an upgrade or replacement of the vulnerable software version once a patch or secure alternative is available. 8) Educate IT and security teams about the vulnerability and ensure incident response plans are updated to handle potential exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-07-22T07:17:43.793Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 687fa432a83201eaac1ce8ec
Added to database: 7/22/2025, 2:46:10 PM
Last enriched: 7/22/2025, 3:01:11 PM
Last updated: 7/23/2025, 12:39:45 AM
Views: 3
Related Threats
CVE-2025-42947: CWE-94: Improper Control of Generation of Code in SAP_SE SAP FICA ODN framework
MediumCVE-2025-7722: CWE-272 Least Privilege Violation in steverio Social Streams
HighCVE-2025-6261: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in fleetwire Fleetwire Fleet Management
MediumCVE-2025-6215: CWE-862 Missing Authorization in omnishop Omnishop – Mobile shop apps complementing your WooCommerce webshop
MediumCVE-2025-6214: CWE-352 Cross-Site Request Forgery (CSRF) in omnishop Omnishop – Mobile shop apps complementing your WooCommerce webshop
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.