CVSS VectorNVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Lifecycle Timeline
4DescriptionNVD
A vulnerability, which was classified as critical, has been found in SourceCodester Client Database Management System 1.0. This issue affects some unknown processing of the file /user_customer_create_order.php. The manipulation of the argument user_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
AnalysisAI
A critical SQL injection vulnerability exists in SourceCodester Client Database Management System version 1.0 affecting the /user_customer_create_order.php file, where the user_id parameter is inadequately sanitized. An unauthenticated remote attacker can exploit this vulnerability to inject arbitrary SQL commands, potentially leading to unauthorized data access, modification, or deletion. Public disclosure and proof-of-concept availability elevate exploitation risk, though the CVSS 7.3 rating indicates moderate real-world impact rather than critical severity.
Technical ContextAI
The vulnerability is a classic SQL injection flaw (CWE-74: Improper Neutralization of Special Elements used in an Output ('Injection')) in a PHP-based web application. The /user_customer_create_order.php endpoint fails to properly validate or parameterize the user_id input parameter before incorporating it into SQL queries. SourceCodester Client Database Management System 1.0 is a PHP-based customer relationship and order management application typically running on Apache/Nginx with MySQL/MariaDB backends. The root cause is the absence of prepared statements or input validation, allowing attackers to break out of intended SQL context and execute arbitrary queries. This affects CPE entry: cpe:2.3:a:sourcecodester:client_database_management_system:1.0:*:*:*:*:*:*:*
RemediationAI
Contact SourceCodester directly or check their official website/GitHub for patched versions beyond 1.0. As a third-party open-source project, patches may be available in development branches.
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-18478