CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Lifecycle Timeline
4Description
A vulnerability, which was classified as critical, has been found in code-projects Simple Pizza Ordering System 1.0. This issue affects some unknown processing of the file /update.php. The manipulation of the argument ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Analysis
CVE-2025-6481 is a critical SQL injection vulnerability in code-projects Simple Pizza Ordering System 1.0 affecting the /update.php file's ID parameter, allowing unauthenticated remote attackers to manipulate database queries and potentially extract, modify, or delete sensitive data. The vulnerability has been publicly disclosed with proof-of-concept availability, significantly increasing exploitation risk in production environments. With a CVSS score of 7.3 and low attack complexity, this represents an immediate threat to any organization running the affected version without patches.
Technical Context
The vulnerability exists in the /update.php file of Simple Pizza Ordering System 1.0 and is classified as CWE-74 (Improper Neutralization of Special Elements in Output Used by a Downstream Component—'Injection'). The root cause is inadequate input validation and sanitization of the 'ID' parameter before its use in SQL queries, allowing attackers to inject arbitrary SQL commands. The affected application likely uses PHP with MySQL/MariaDB backend without parameterized queries or prepared statements. CPE representation would be: cpe:23A:code-projects:simple_pizza_ordering_system:1.0:*:*:*:*:*:*:*. The vulnerable endpoint processes user-supplied ID values directly in SQL context, enabling classic SQL injection attacks such as UNION-based, blind time-based, or error-based injection techniques.
Affected Products
- product: code-projects Simple Pizza Ordering System; version: 1.0; vulnerable_component: /update.php (ID parameter); cpe: cpe:23A:code-projects:simple_pizza_ordering_system:1.0:*:*:*:*:*:*:*; attack_surface: HTTP GET/POST request to /update.php with ID parameter
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-18848