A vulnerability was identified in code-projects Simple Food Ordering System 1.0. Impacted is an unknown function of the file /product.php. Such manipulation of the argument Category leads to sql injection. The attack can be launched remotely. The exploit is publicly available and might be used.
References
Link | Resource |
---|---|
https://code-projects.org/ | Product |
https://github.com/tiancesec/CVE/issues/6 | Exploit Third Party Advisory |
https://vuldb.com/?ctiid.327333 | Permissions Required VDB Entry |
https://vuldb.com/?id.327333 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.665011 | Third Party Advisory VDB Entry |
https://github.com/tiancesec/CVE/issues/6 | Exploit Third Party Advisory |
Configurations
History
09 Oct 2025, 16:39
Type | Values Removed | Values Added |
---|---|---|
References | () https://code-projects.org/ - Product | |
References | () https://github.com/tiancesec/CVE/issues/6 - Exploit, Third Party Advisory | |
References | () https://vuldb.com/?ctiid.327333 - Permissions Required, VDB Entry | |
References | () https://vuldb.com/?id.327333 - Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?submit.665011 - Third Party Advisory, VDB Entry | |
CPE | cpe:2.3:a:fabian:simple_food_ordering_system:1.0:*:*:*:*:*:*:* | |
First Time |
Fabian
Fabian simple Food Ordering System |
07 Oct 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/tiancesec/CVE/issues/6 - |
07 Oct 2025, 13:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-10-07 13:15
Updated : 2025-10-09 16:39
NVD link : CVE-2025-11396
Mitre link : CVE-2025-11396
CVE.ORG link : CVE-2025-11396
JSON object : View
Products Affected
fabian
- simple_food_ordering_system