CVE-2025-6357

| EUVD-2025-18770 HIGH
2025-06-20 [email protected]
7.3
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low

Lifecycle Timeline

4
Analysis Generated
Mar 15, 2026 - 00:19 vuln.today
EUVD ID Assigned
Mar 15, 2026 - 00:19 euvd
EUVD-2025-18770
PoC Detected
Jun 26, 2025 - 13:10 vuln.today
Public exploit code
CVE Published
Jun 20, 2025 - 18:15 nvd
HIGH 7.3

Description

A vulnerability was found in code-projects Simple Pizza Ordering System 1.0. It has been classified as critical. Affected is an unknown function of the file /paymentportal.php. The manipulation of the argument person leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

Analysis

CVE-2025-6357 is a critical SQL injection vulnerability in code-projects Simple Pizza Ordering System version 1.0, specifically in the /paymentportal.php file where the 'person' parameter is not properly sanitized. An unauthenticated remote attacker can exploit this vulnerability with no user interaction required to execute arbitrary SQL commands, potentially leading to unauthorized data access, modification, or deletion of database contents. The vulnerability has been publicly disclosed with proof-of-concept code available, increasing the likelihood of active exploitation.

Technical Context

This vulnerability is rooted in CWE-74 (Improper Neutralization of Special Elements in Output Used by a Downstream Component, 'Injection') and represents a classic SQL injection flaw. The /paymentportal.php endpoint fails to properly validate or parameterize user-supplied input from the 'person' parameter before incorporating it into SQL queries. The affected product is code-projects Simple Pizza Ordering System 1.0, a PHP-based web application commonly deployed in small business payment processing scenarios. The vulnerability allows attackers to manipulate SQL query logic by injecting malicious SQL syntax through the vulnerable parameter, bypassing authentication and access controls at the database level. This is particularly severe in payment processing contexts where sensitive customer and financial data resides.

Affected Products

Simple Pizza Ordering System version 1.0 by code-projects. Affected file: /paymentportal.php. Vulnerable parameter: 'person'. CPE candidate string: cpe:2.3:a:code-projects:simple_pizza_ordering_system:1.0:*:*:*:*:*:*:*. This product appears to be a lightweight open-source or community project with limited vendor support infrastructure. No official vendor advisory URL has been identified in standard vulnerability databases, suggesting this may be a community-discovered vulnerability without formal vendor coordination.

Remediation

Immediate remediation steps: (1) Implement prepared statements/parameterized queries for the /paymentportal.php 'person' parameter and all database interactions—replace string concatenation with parameter binding using PHP PDO or mysqli prepared statements; (2) Deploy Web Application Firewall (WAF) rules to block SQL injection patterns (UNION, SELECT, OR 1=1, etc.) targeting /paymentportal.php; (3) Apply input validation using strict whitelisting for the 'person' parameter (e.g., alphanumeric only if applicable); (4) If a patched version exists from code-projects, upgrade immediately—check project repository (GitHub/SourceForge) for version 1.1 or later patches; (5) Conduct database activity monitoring and enable query logging to detect injection attempts; (6) Conduct urgent security audit of all other PHP files for similar injection vulnerabilities; (7) As a temporary stopgap, disable or restrict access to /paymentportal.php until patching is complete.

Priority Score

57
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +36
POC: +20

Share

CVE-2025-6357 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy