A weakness has been identified in code-projects Online Ordering System 1.0. The impacted element is an unknown function of the file /user_contact.php. This manipulation of the argument Name causes sql injection. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited.
References
| Link | Resource |
|---|---|
| https://code-projects.org/ | Product |
| https://github.com/zzb1388/cve/issues/94 | Exploit Issue Tracking Third Party Advisory |
| https://vuldb.com/?ctiid.334760 | Permissions Required VDB Entry |
| https://vuldb.com/?id.334760 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.702466 | Third Party Advisory VDB Entry |
| https://github.com/zzb1388/cve/issues/94 | Exploit Issue Tracking Third Party Advisory |
Configurations
History
10 Dec 2025, 17:36
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://code-projects.org/ - Product | |
| References | () https://github.com/zzb1388/cve/issues/94 - Exploit, Issue Tracking, Third Party Advisory | |
| References | () https://vuldb.com/?ctiid.334760 - Permissions Required, VDB Entry | |
| References | () https://vuldb.com/?id.334760 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?submit.702466 - Third Party Advisory, VDB Entry | |
| First Time |
Fabian
Fabian online Ordering System |
|
| CPE | cpe:2.3:a:fabian:online_ordering_system:1.0:*:*:*:*:*:*:* |
08 Dec 2025, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/zzb1388/cve/issues/94 - |
08 Dec 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-08 16:15
Updated : 2025-12-10 17:36
NVD link : CVE-2025-14250
Mitre link : CVE-2025-14250
CVE.ORG link : CVE-2025-14250
JSON object : View
Products Affected
fabian
- online_ordering_system
