CVE-2025-5980

| EUVD-2025-17832 HIGH
2025-06-10 [email protected]
7.3
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low

Lifecycle Timeline

4
Analysis Generated
Mar 14, 2026 - 19:49 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 19:49 euvd
EUVD-2025-17832
PoC Detected
Jun 16, 2025 - 14:52 vuln.today
Public exploit code
CVE Published
Jun 10, 2025 - 21:15 nvd
HIGH 7.3

DescriptionNVD

A vulnerability classified as critical was found in code-projects Restaurant Order System 1.0. This vulnerability affects unknown code of the file /order.php. The manipulation of the argument tabidNoti leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

AnalysisAI

Critical SQL injection vulnerability in code-projects Restaurant Order System 1.0 affecting the /order.php file, specifically the 'tabidNoti' parameter. Remote unauthenticated attackers can exploit this vulnerability to execute arbitrary SQL queries, potentially leading to unauthorized data access, modification, or deletion. The vulnerability has been publicly disclosed with exploit code available, making active exploitation likely.

Technical ContextAI

This vulnerability is classified as CWE-74 (Improper Neutralization of Special Elements in Output Used by a Downstream Component), which represents improper input validation in SQL contexts. The Restaurant Order System's /order.php file fails to properly sanitize or parameterize the 'tabidNoti' parameter before incorporating it into SQL queries. This classic SQL injection flaw allows attackers to break out of intended SQL syntax and execute arbitrary database commands. The vulnerability affects code-projects Restaurant Order System version 1.0, a web-based restaurant management application written in PHP that processes customer orders and manages table information through database queries.

RemediationAI

Immediate actions: (1) Apply input validation to the 'tabidNoti' parameter using parameterized queries/prepared statements in /order.php; (2) Implement whitelist validation to ensure 'tabidNoti' contains only expected numeric table identifiers; (3) Escape all database input using PHP's mysqli_real_escape_string() or PDO prepared statements; (4) Apply principle of least privilege to database user accounts. If available, upgrade to a patched version beyond 1.0. Temporary mitigation: implement Web Application Firewall (WAF) rules blocking SQL injection patterns in the /order.php endpoint and restrict access to this endpoint by IP if possible. Monitor database logs for SQL injection attempts.

Share

CVE-2025-5980 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy