CVE-2025-3342

7.3 HIGH

📋 TL;DR

This critical SQL injection vulnerability in codeprojects Online Restaurant Management System 1.0 allows attackers to manipulate database queries through the /admin/payment_save.php endpoint. Remote attackers can potentially access, modify, or delete sensitive data including customer information, payment details, and system credentials. All installations of version 1.0 with the vulnerable file accessible are affected.

💻 Affected Systems

Products:
  • codeprojects Online Restaurant Management System
Versions: 1.0
Operating Systems: All platforms running the web application
Default Config Vulnerable: ⚠️ Yes
Notes: Any installation with the /admin/payment_save.php file accessible is vulnerable

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, system takeover, and potential lateral movement to connected systems

🟠

Likely Case

Unauthorized data access and modification, potentially exposing sensitive customer and payment information

🟢

If Mitigated

Limited impact with proper input validation and database permissions restricting damage to non-critical data

🌐 Internet-Facing: HIGH - The vulnerability is remotely exploitable and affects web-facing systems
🏢 Internal Only: MEDIUM - Internal systems are still vulnerable but attack surface is reduced

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit details are publicly available on GitHub, making this easily exploitable by attackers with basic SQL injection knowledge

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Consider implementing parameterized queries and input validation in /admin/payment_save.php

🔧 Temporary Workarounds

Web Application Firewall (WAF) Rules

all

Implement WAF rules to block SQL injection patterns targeting the /admin/payment_save.php endpoint

Access Restriction

all

Restrict access to /admin/payment_save.php using IP whitelisting or authentication requirements

🧯 If You Can't Patch

  • Implement network segmentation to isolate the vulnerable system from critical infrastructure
  • Enable detailed logging and monitoring for suspicious database queries and access patterns

🔍 How to Verify

Check if Vulnerable:

Test the /admin/payment_save.php endpoint with SQL injection payloads in the ID parameter

Check Version:

Check the application version in the admin panel or configuration files

Verify Fix Applied:

Verify that SQL injection attempts no longer succeed and that parameterized queries are implemented

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in application logs
  • Multiple failed login attempts to admin panel
  • Suspicious database access patterns

Network Indicators:

  • HTTP requests to /admin/payment_save.php with SQL injection patterns
  • Unusual outbound database connections

SIEM Query:

source="web_logs" AND uri="/admin/payment_save.php" AND (payload="' OR " OR payload="--" OR payload="UNION" OR payload="SELECT")

🔗 References

📤 Share & Export