Skip to main content

CVE-2025-9660: SQL Injection in SourceCodester Bakeshop Online Ordering System

Medium
VulnerabilityCVE-2025-9660cvecve-2025-9660
Published: Fri Aug 29 2025 (08/29/2025, 16:32:06 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: Bakeshop Online Ordering System

Description

A vulnerability was found in SourceCodester Bakeshop Online Ordering System 1.0. The impacted element is an unknown function of the file /passwordrecover.php. Performing manipulation of the argument phonenumber results in sql injection. The attack is possible to be carried out remotely. The exploit has been made public and could be used.

AI-Powered Analysis

AILast updated: 08/29/2025, 17:03:27 UTC

Technical Analysis

CVE-2025-9660 is a SQL Injection vulnerability identified in version 1.0 of the SourceCodester Bakeshop Online Ordering System. The vulnerability resides in the /passwordrecover.php file, specifically in an unknown function that processes the 'phonenumber' argument. By manipulating this parameter, an attacker can inject malicious SQL code remotely without requiring any authentication or user interaction. This flaw allows attackers to interfere with the backend database queries, potentially leading to unauthorized data access, data modification, or even complete compromise of the database. The vulnerability has a CVSS 4.0 base score of 6.9, indicating a medium severity level, with characteristics including network attack vector, low complexity, no privileges or user interaction required, and limited impact on confidentiality, integrity, and availability. Although no public exploits are currently known to be actively used in the wild, the exploit code has been made public, increasing the risk of exploitation by opportunistic attackers. The lack of a patch or official remediation from the vendor further exacerbates the risk. SQL Injection vulnerabilities are critical because they can allow attackers to bypass application security controls, extract sensitive information such as user credentials or payment data, and potentially escalate attacks to compromise the entire system infrastructure. Given that this vulnerability affects an online ordering system, the confidentiality and integrity of customer data and order transactions are at risk, which could lead to financial fraud, reputational damage, and regulatory non-compliance.

Potential Impact

For European organizations using the SourceCodester Bakeshop Online Ordering System version 1.0, this vulnerability poses a significant risk to customer data privacy and business operations. Exploitation could lead to unauthorized disclosure of personal identifiable information (PII), including customer contact details and order histories, violating GDPR requirements and potentially resulting in heavy fines. Integrity of order data could be compromised, leading to fraudulent orders or financial losses. Availability impact is limited but could occur if attackers manipulate database queries to cause denial of service. The remote and unauthenticated nature of the attack vector means that any exposed instance of the vulnerable system on the internet is at risk. This is particularly concerning for small and medium-sized European bakeries or food service businesses that may lack dedicated cybersecurity resources and rely on this system for online sales. The public availability of exploit code increases the likelihood of automated scanning and exploitation attempts by cybercriminals. Additionally, the potential for lateral movement or further compromise exists if the backend database contains credentials or access to other internal systems. The reputational damage and loss of customer trust resulting from a breach could have long-term negative effects on affected businesses.

Mitigation Recommendations

1. Immediate mitigation should include restricting external access to the /passwordrecover.php endpoint via web application firewalls (WAFs) or network access controls to limit exposure. 2. Implement input validation and parameterized queries or prepared statements in the source code to eliminate SQL Injection risks; this requires code review and secure coding practices. 3. If source code modification is not immediately feasible, deploy virtual patching through WAF rules that detect and block suspicious SQL injection patterns targeting the 'phonenumber' parameter. 4. Monitor logs for unusual database query patterns or repeated failed password recovery attempts that may indicate exploitation attempts. 5. Conduct a thorough security audit of the entire application and underlying database to identify and remediate any additional injection points or vulnerabilities. 6. Plan for an upgrade or replacement of the vulnerable system with a secure, actively maintained solution. 7. Educate staff on incident response procedures in case of a suspected breach. 8. Regularly back up databases and ensure backups are stored securely to enable recovery in case of data corruption or loss. 9. Engage with the vendor or community to obtain patches or security updates as they become available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-29T07:12:34.618Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68b1d9c3ad5a09ad007982d2

Added to database: 8/29/2025, 4:48:03 PM

Last enriched: 8/29/2025, 5:03:27 PM

Last updated: 8/29/2025, 5:52:48 PM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats