CVE-2025-13201

7.3 HIGH

📋 TL;DR

CVE-2025-13201 is an SQL injection vulnerability in code-projects Simple Cafe Ordering System 1.0 that allows attackers to execute arbitrary SQL commands through the Username parameter in /login.php. This affects all deployments of version 1.0 of this software. Attackers can exploit this remotely without authentication to potentially access or manipulate database contents.

💻 Affected Systems

Products:
  • code-projects Simple Cafe Ordering System
Versions: 1.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all installations of version 1.0. The vulnerability is in the core authentication mechanism.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including data theft, data manipulation, authentication bypass, and potential remote code execution if database functions allow it.

🟠

Likely Case

Unauthorized access to sensitive data (customer information, order history, credentials), data manipulation, and potential authentication bypass.

🟢

If Mitigated

Limited impact with proper input validation and database permissions, potentially only error messages or limited data exposure.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit available on GitHub. SQL injection through login form requires minimal technical skill.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://code-projects.org/

Restart Required: No

Instructions:

No official patch available. Consider migrating to alternative software or implementing custom fixes.

🔧 Temporary Workarounds

Input Validation and Parameterized Queries

all

Modify login.php to use prepared statements and validate/sanitize Username input

Replace SQL queries with parameterized queries using mysqli or PDO prepared statements

Web Application Firewall (WAF)

all

Deploy WAF rules to block SQL injection patterns

Configure WAF to block SQL injection patterns in POST parameters

🧯 If You Can't Patch

  • Isolate the system behind a firewall with strict access controls
  • Implement network segmentation and restrict database access

🔍 How to Verify

Check if Vulnerable:

Test login.php with SQL injection payloads in Username field (e.g., admin' OR '1'='1)

Check Version:

Check software version in admin panel or configuration files

Verify Fix Applied:

Test with same payloads - should return authentication failure without SQL errors

📡 Detection & Monitoring

Log Indicators:

  • SQL syntax errors in web server logs
  • Multiple failed login attempts with SQL patterns
  • Unusual database queries from web application

Network Indicators:

  • SQL injection patterns in HTTP POST requests to /login.php
  • Unusual database port traffic from web server

SIEM Query:

source="web_logs" AND (url="/login.php" AND (message="*sql*" OR message="*syntax*" OR param="*' OR*"))

🔗 References

📤 Share & Export