CVE-2025-14250
📋 TL;DR
CVE-2025-14250 is a SQL injection vulnerability in code-projects Online Ordering System 1.0 that allows remote attackers to execute arbitrary SQL commands via the Name parameter in /user_contact.php. This affects all deployments of version 1.0, potentially compromising database integrity and confidentiality.
💻 Affected Systems
- code-projects Online Ordering System
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise including data theft, modification, or deletion; potential remote code execution if database configuration permits.
Likely Case
Unauthorized data access, privilege escalation, and data manipulation affecting user information and order data.
If Mitigated
Limited impact with proper input validation and database permissions, potentially only error messages or minimal data exposure.
🎯 Exploit Status
Public exploit available on GitHub; remote exploitation requires no authentication.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: https://code-projects.org/
Restart Required: No
Instructions:
No official patch available. Consider upgrading to a newer version if available, or implement workarounds.
🔧 Temporary Workarounds
Input Validation and Sanitization
allImplement parameterized queries or input validation for the Name parameter in user_contact.php
Edit user_contact.php to use prepared statements: $stmt = $conn->prepare('INSERT INTO contacts (name) VALUES (?)'); $stmt->bind_param('s', $name);
Web Application Firewall (WAF)
allDeploy WAF rules to block SQL injection patterns
ModSecurity rule: SecRule ARGS:Name "@detectSQLi" "id:1001,phase:2,deny,status:403"
🧯 If You Can't Patch
- Isolate the system behind a firewall with strict inbound/outbound rules
- Implement network segmentation to limit database access from web servers
🔍 How to Verify
Check if Vulnerable:
Test the Name parameter in /user_contact.php with SQL injection payloads like ' OR '1'='1
Check Version:
Check system documentation or configuration files for version information
Verify Fix Applied:
Verify that SQL injection payloads no longer execute and return appropriate error messages or are blocked
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL queries in database logs
- Multiple failed login attempts or parameter manipulation in web server logs
Network Indicators:
- Unusual database connections from web server IPs
- SQL error messages in HTTP responses
SIEM Query:
source="web_logs" AND (url="/user_contact.php" AND (param="Name" AND value MATCHES "[';]|OR|UNION|SELECT"))