CVE-2025-3345
📋 TL;DR
CVE-2025-3345 is a critical SQL injection vulnerability in codeprojects Online Restaurant Management System 1.0 that allows remote attackers to execute arbitrary SQL commands via the 'del' parameter in /admin/combo.php. This affects all systems running the vulnerable software version. Attackers can potentially access, modify, or delete database content without authentication.
💻 Affected Systems
- codeprojects Online Restaurant Management System
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise leading to data theft, data destruction, authentication bypass, and potential remote code execution via database functions.
Likely Case
Unauthorized data access and modification, including extraction of sensitive information like user credentials, payment data, and business records.
If Mitigated
Limited impact with proper input validation and database permissions, potentially only allowing data viewing without modification.
🎯 Exploit Status
Exploit details are publicly available on GitHub, making this easily weaponizable by attackers with basic SQL injection knowledge.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: None found
Restart Required: No
Instructions:
No official patch available. Consider migrating to alternative software or implementing workarounds.
🔧 Temporary Workarounds
Input Validation and Sanitization
allAdd parameter validation and sanitization to the del parameter in /admin/combo.php
Edit /admin/combo.php to add: $del = mysqli_real_escape_string($connection, $_GET['del']);
Web Application Firewall (WAF)
allDeploy WAF rules to block SQL injection patterns targeting the del parameter
ModSecurity rule: SecRule ARGS:del "@detectSQLi" "id:1001,phase:2,deny,status:403"
🧯 If You Can't Patch
- Block external access to /admin/combo.php using firewall rules or web server configuration
- Implement strict database user permissions with read-only access where possible
🔍 How to Verify
Check if Vulnerable:
Test if /admin/combo.php?del=1' exists and returns database errors when adding SQL injection payloads
Check Version:
Check software version in admin panel or readme files
Verify Fix Applied:
Test that SQL injection payloads no longer execute and return proper error handling
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL errors in application logs
- Multiple requests to /admin/combo.php with suspicious del parameter values
- Database queries with unexpected UNION or SELECT statements
Network Indicators:
- HTTP requests containing SQL keywords in del parameter
- Unusual traffic patterns to admin interface
SIEM Query:
source="web_logs" AND uri_path="/admin/combo.php" AND (query_string="*del=*'*" OR query_string="*del=*%27*")