A vulnerability has been found in SourceCodester Food Ordering Management System up to 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/menus/view_menu.php. The manipulation of the argument ID leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
References
Link | Resource |
---|---|
https://hackmd.io/@gnol719/rJqOPiInye | Exploit |
https://vuldb.com/?ctiid.301495 | Permissions Required VDB Entry |
https://vuldb.com/?id.301495 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.522402 | Third Party Advisory VDB Entry |
https://www.sourcecodester.com/ | Product |
https://hackmd.io/@gnol719/rJqOPiInye | Exploit |
Configurations
History
01 Apr 2025, 15:44
Type | Values Removed | Values Added |
---|---|---|
References | () https://hackmd.io/@gnol719/rJqOPiInye - Exploit | |
References | () https://vuldb.com/?ctiid.301495 - Permissions Required, VDB Entry | |
References | () https://vuldb.com/?id.301495 - Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?submit.522402 - Third Party Advisory, VDB Entry | |
References | () https://www.sourcecodester.com/ - Product | |
CPE | cpe:2.3:a:oretnom23:food_ordering_management_system:*:*:*:*:*:*:*:* | |
First Time |
Oretnom23 food Ordering Management System
Oretnom23 |
|
Summary |
|
27 Mar 2025, 15:16
Type | Values Removed | Values Added |
---|---|---|
References | () https://hackmd.io/@gnol719/rJqOPiInye - |
27 Mar 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-27 14:15
Updated : 2025-04-01 15:44
NVD link : CVE-2025-2852
Mitre link : CVE-2025-2852
CVE.ORG link : CVE-2025-2852
JSON object : View
Products Affected
oretnom23
- food_ordering_management_system