EUVD-2025-18848

| CVE-2025-6481 HIGH
2025-06-22 [email protected]
7.3
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low

Lifecycle Timeline

4
Analysis Generated
Mar 15, 2026 - 21:55 vuln.today
EUVD ID Assigned
Mar 15, 2026 - 21:55 euvd
EUVD-2025-18848
PoC Detected
Jun 25, 2025 - 19:17 vuln.today
Public exploit code
CVE Published
Jun 22, 2025 - 15:15 nvd
HIGH 7.3

Description

A vulnerability, which was classified as critical, has been found in code-projects Simple Pizza Ordering System 1.0. This issue affects some unknown processing of the file /update.php. The manipulation of the argument ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

Analysis

CVE-2025-6481 is a critical SQL injection vulnerability in code-projects Simple Pizza Ordering System 1.0 affecting the /update.php file's ID parameter, allowing unauthenticated remote attackers to manipulate database queries and potentially extract, modify, or delete sensitive data. The vulnerability has been publicly disclosed with proof-of-concept availability, significantly increasing exploitation risk in production environments. With a CVSS score of 7.3 and low attack complexity, this represents an immediate threat to any organization running the affected version without patches.

Technical Context

The vulnerability exists in the /update.php file of Simple Pizza Ordering System 1.0 and is classified as CWE-74 (Improper Neutralization of Special Elements in Output Used by a Downstream Component—'Injection'). The root cause is inadequate input validation and sanitization of the 'ID' parameter before its use in SQL queries, allowing attackers to inject arbitrary SQL commands. The affected application likely uses PHP with MySQL/MariaDB backend without parameterized queries or prepared statements. CPE representation would be: cpe:23A:code-projects:simple_pizza_ordering_system:1.0:*:*:*:*:*:*:*. The vulnerable endpoint processes user-supplied ID values directly in SQL context, enabling classic SQL injection attacks such as UNION-based, blind time-based, or error-based injection techniques.

Affected Products

- product: code-projects Simple Pizza Ordering System; version: 1.0; vulnerable_component: /update.php (ID parameter); cpe: cpe:23A:code-projects:simple_pizza_ordering_system:1.0:*:*:*:*:*:*:*; attack_surface: HTTP GET/POST request to /update.php with ID parameter

Priority Score

57
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +36
POC: +20

Share

EUVD-2025-18848 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy