CVE-2025-7814

7.3 HIGH

📋 TL;DR

A critical SQL injection vulnerability in code-projects Food Ordering Review System 1.0 allows remote attackers to execute arbitrary SQL commands via the fname parameter in /pages/signup_function.php. This can lead to unauthorized data access, modification, or deletion. Any organization using this software is affected.

💻 Affected Systems

Products:
  • code-projects Food Ordering Review System
Versions: 1.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default installation. Any system with the signup functionality accessible is vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including data theft, data destruction, and potential server takeover via SQL injection leading to remote code execution.

🟠

Likely Case

Unauthorized access to sensitive user data (personal information, credentials), manipulation of order/review data, and potential privilege escalation.

🟢

If Mitigated

Limited impact with proper input validation and database permissions, potentially only error messages or minor data exposure.

🌐 Internet-Facing: HIGH - The vulnerability is remotely exploitable and affects a web-facing application component.
🏢 Internal Only: MEDIUM - Internal systems could still be vulnerable if the application is deployed internally, though attack surface is reduced.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details are publicly available on GitHub. SQL injection vulnerabilities are commonly weaponized due to their simplicity and impact.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://code-projects.org/

Restart Required: No

Instructions:

No official patch available. Consider implementing parameterized queries or input validation as described in workarounds.

🔧 Temporary Workarounds

Implement Input Validation

all

Add server-side validation to sanitize and validate the fname parameter before processing.

Edit /pages/signup_function.php to add validation: if (!preg_match('/^[a-zA-Z\s]+$/', $_POST['fname'])) { die('Invalid input'); }

Use Parameterized Queries

all

Replace direct SQL concatenation with prepared statements to prevent SQL injection.

Replace $sql = "INSERT INTO users (fname) VALUES ('" . $_POST['fname'] . "')"; with prepared statements using PDO or mysqli.

🧯 If You Can't Patch

  • Disable or restrict access to /pages/signup_function.php via web server configuration or firewall rules.
  • Implement a Web Application Firewall (WAF) with SQL injection protection rules.

🔍 How to Verify

Check if Vulnerable:

Test the signup functionality by submitting SQL injection payloads in the fname field (e.g., ' OR '1'='1) and observe if database errors or unexpected behavior occurs.

Check Version:

Check the software version in documentation or configuration files; this vulnerability is specific to version 1.0.

Verify Fix Applied:

After applying workarounds, retest with SQL injection payloads to ensure they are properly rejected or sanitized without database errors.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL errors in application logs, multiple failed signup attempts with special characters in fname field.

Network Indicators:

  • HTTP POST requests to /pages/signup_function.php containing SQL keywords or special characters in parameters.

SIEM Query:

source="web_logs" AND uri="/pages/signup_function.php" AND (request_body CONTAINS "' OR" OR request_body CONTAINS "UNION" OR request_body CONTAINS "SELECT")

🔗 References

📤 Share & Export