CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Lifecycle Timeline
4Description
A vulnerability was found in code-projects Simple Pizza Ordering System 1.0 and classified as critical. This issue affects some unknown processing of the file /addmem.php. The manipulation leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Analysis
CVE-2025-6356 is a critical SQL injection vulnerability in code-projects Simple Pizza Ordering System version 1.0, specifically in the /addmem.php file that allows unauthenticated remote attackers to manipulate database queries. An attacker can exploit this vulnerability to read, modify, or delete sensitive data from the underlying database. The vulnerability has public exploit code available and may be actively exploited in the wild.
Technical Context
The vulnerability is a classic SQL injection flaw (CWE-74: Improper Neutralization of Special Elements used in an SQL Command) occurring in the /addmem.php endpoint of the Simple Pizza Ordering System. The root cause is insufficient input validation and sanitization of user-supplied parameters before they are incorporated into SQL queries. Rather than using parameterized queries or prepared statements, the application directly concatenates user input into SQL command strings. This allows attackers to inject arbitrary SQL syntax to break out of the intended query context and execute malicious database operations. The affected product is identified as code-projects Simple Pizza Ordering System 1.0, a PHP-based web application commonly used for small restaurant ordering platforms.
Affected Products
- product: Simple Pizza Ordering System; vendor: code-projects; version: 1.0; affected_component: /addmem.php; cpe: cpe:2.3:a:code-projects:simple_pizza_ordering_system:1.0:*:*:*:*:*:*:*; status: Vulnerable
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-18771