CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Lifecycle Timeline
4Description
A vulnerability was found in code-projects Simple Pizza Ordering System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /saveorder.php. The manipulation of the argument ID leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Analysis
CVE-2025-6358 is a critical SQL injection vulnerability in code-projects Simple Pizza Ordering System version 1.0, affecting the /saveorder.php file's ID parameter. An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary SQL queries, potentially leading to unauthorized data access, modification, and system disruption. Public proof-of-concept code is available, increasing the immediate risk of active exploitation.
Technical Context
The vulnerability is a classic SQL injection flaw (CWE-74: Improper Neutralization of Special Elements used in an SQL Command) in a PHP-based web application. The /saveorder.php endpoint fails to properly sanitize or parameterize the ID parameter before incorporating it into SQL queries, allowing attackers to inject malicious SQL syntax. This occurs in a server-side scripting context where user input flows directly into database queries without prepared statements or input validation. The affected product is a simple e-commerce ordering system written in PHP, likely using traditional procedural database interaction methods rather than secure ORM frameworks.
Affected Products
Product: code-projects Simple Pizza Ordering System; Affected Version(s): 1.0 and likely all versions prior to patching; CPE (estimated): cpe:2.4:a:code-projects:simple_pizza_ordering_system:1.0:*:*:*:*:*:*:*; File: /saveorder.php; Parameter: ID. No patch version information is provided in available data; vendor advisory and patch availability status is unknown and requires direct contact with code-projects or monitoring of their repository/website.
Remediation
Immediate actions: (1) If patch is available from code-projects, apply immediately; (2) Implement Web Application Firewall (WAF) rules to block SQL injection patterns in the ID parameter (e.g., regex blocking single quotes, UNION, SELECT, comment syntax); (3) Disable or restrict access to /saveorder.php via firewall/reverse proxy until patched; (4) Modify source code to use parameterized queries/prepared statements for all database interactions in saveorder.php. Long-term: Audit all other .php files for similar SQL injection vulnerabilities; migrate to a security-focused framework with built-in SQL injection protection; implement input validation and output encoding throughout the application. Contact code-projects directly for official patch status and advisory information.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-28727