CVE-2025-6363

| EUVD-2025-18785 HIGH
2025-06-20 [email protected]
7.3
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low

Lifecycle Timeline

4
Analysis Generated
Mar 15, 2026 - 00:19 vuln.today
EUVD ID Assigned
Mar 15, 2026 - 00:19 euvd
EUVD-2025-18785
PoC Detected
Jul 02, 2025 - 18:56 vuln.today
Public exploit code
CVE Published
Jun 20, 2025 - 20:15 nvd
HIGH 7.3

Description

A vulnerability, which was classified as critical, was found in code-projects Simple Pizza Ordering System 1.0. Affected is an unknown function of the file /adding-exec.php. The manipulation of the argument ingname leads to sql injection. It is possible to launch the attack remotely.

Analysis

CVE-2025-6363 is a critical SQL injection vulnerability in code-projects Simple Pizza Ordering System version 1.0, specifically in the /adding-exec.php file where the 'ingname' parameter is improperly sanitized. An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary SQL queries, potentially leading to unauthorized data access, modification, or deletion of database records. With a CVSS score of 7.3 and network-based attack vector requiring no user interaction, this vulnerability poses significant risk to affected deployments, though real-world exploitation likelihood depends on whether POC code and active exploitation attempts are documented.

Technical Context

The vulnerability stems from CWE-74 (Improper Neutralization of Special Elements in Output Used by a Downstream Component - 'Injection'), which indicates insufficient input validation/sanitization of the 'ingname' parameter before it is incorporated into SQL query construction. The affected application is code-projects Simple Pizza Ordering System 1.0 (CPE identifier likely: cpe:2.3:a:code-projects:simple_pizza_ordering_system:1.0:*:*:*:*:*:*:*), a PHP-based web application. The vulnerable endpoint /adding-exec.php processes ingredient name submissions without parameterized queries or prepared statements, allowing attackers to inject malicious SQL syntax that the database interprets as code rather than data. This is a classic first-order SQL injection vulnerability where user-controlled input flows directly into query execution.

Affected Products

Simple Pizza Ordering System (['1.0'])

Remediation

primary: Upgrade to a patched version >1.0 if available from code-projects; verify vendor release notes or GitHub repository for security patches.; code_fix: Implement prepared statements/parameterized queries in /adding-exec.php. Replace direct SQL concatenation with parameterized prepared statements (e.g., using MySQLi prepared statements or PDO with bound parameters).; input_validation: Validate and sanitize the 'ingname' parameter: use whitelisting (alphanumeric + safe characters), enforce length limits, and apply database-specific escaping (e.g., mysqli_real_escape_string) as a secondary measure (not primary defense).; web_application_firewall: Deploy WAF rules to block SQL injection patterns in the ingname parameter (e.g., detection of SQL keywords: UNION, SELECT, DROP, etc.).; database_access_control: Run the application database user account with minimal privileges (no ALTER/DROP permissions; SELECT/INSERT/UPDATE only on necessary tables).; monitoring: Log and alert on SQL errors in /adding-exec.php; monitor for unusual query patterns indicative of injection attempts.

Priority Score

57
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +36
POC: +20

Share

CVE-2025-6363 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy