CVSS VectorNVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Lifecycle Timeline
4DescriptionNVD
A vulnerability classified as critical was found in code-projects Restaurant Order System 1.0. This vulnerability affects unknown code of the file /order.php. The manipulation of the argument tabidNoti leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
AnalysisAI
Critical SQL injection vulnerability in code-projects Restaurant Order System 1.0 affecting the /order.php file, specifically the 'tabidNoti' parameter. Remote unauthenticated attackers can exploit this vulnerability to execute arbitrary SQL queries, potentially leading to unauthorized data access, modification, or deletion. The vulnerability has been publicly disclosed with exploit code available, making active exploitation likely.
Technical ContextAI
This vulnerability is classified as CWE-74 (Improper Neutralization of Special Elements in Output Used by a Downstream Component), which represents improper input validation in SQL contexts. The Restaurant Order System's /order.php file fails to properly sanitize or parameterize the 'tabidNoti' parameter before incorporating it into SQL queries. This classic SQL injection flaw allows attackers to break out of intended SQL syntax and execute arbitrary database commands. The vulnerability affects code-projects Restaurant Order System version 1.0, a web-based restaurant management application written in PHP that processes customer orders and manages table information through database queries.
RemediationAI
Immediate actions: (1) Apply input validation to the 'tabidNoti' parameter using parameterized queries/prepared statements in /order.php; (2) Implement whitelist validation to ensure 'tabidNoti' contains only expected numeric table identifiers; (3) Escape all database input using PHP's mysqli_real_escape_string() or PDO prepared statements; (4) Apply principle of least privilege to database user accounts. If available, upgrade to a patched version beyond 1.0. Temporary mitigation: implement Web Application Firewall (WAF) rules blocking SQL injection patterns in the /order.php endpoint and restrict access to this endpoint by IP if possible. Monitor database logs for SQL injection attempts.
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-17832