Online Restaurant Management System 10, SQL Injection, CVE-2025-3344 (Critical)

How the CVE Works

CVE-2025-3344 is a critical SQL injection vulnerability in Online Restaurant Management System 1.0’s `/admin/assign_save.php` file. The flaw occurs due to improper sanitization of the `ID` parameter, allowing attackers to inject malicious SQL queries. When crafted input is passed through the `ID` parameter, the backend database executes unintended commands, potentially enabling unauthorized data access, modification, or deletion. The attack can be performed remotely without authentication (PR:N in CVSS 4.0), exploiting the application’s failure to implement prepared statements or input validation. The vulnerability scores 6.9 (MEDIUM) in CVSS-B but is marked critical due to its potential impact on restaurant operations and customer data exposure.

DailyCVE Form

Platform: Online Restaurant Management
Version: 1.0
Vulnerability: SQL Injection
Severity: Critical
Date: 04/30/2025

What Undercode Say:

Exploitation:

curl -X POST "http://target.com/admin/assign_save.php" -d "ID=1' AND 1=CONVERT(int,(SELECT table_name FROM information_schema.tables WHERE table_schema=database()))--"

Detection:

SELECT FROM logs WHERE request_uri LIKE '%assign_save.php%ID=%--%'

Mitigation:

// Patch for assign_save.php
$id = mysqli_real_escape_string($conn, $_POST['ID']);
$stmt = $conn->prepare("UPDATE assignments SET user_id=? WHERE id=?");
$stmt->bind_param("ii", $user_id, $id);

WAF Rule:

location ~ /admin/assign_save.php {
deny "ID=.[';]";
}

Log Analysis:

import re
malicious_pattern = re.compile(r"ID=.+?[';(]")
if malicious_pattern.search(log_entry):
block_ip(log_entry.ip)

Database Hardening:

REVOKE ALL PRIVILEGES ON restaurant_db. FROM 'webuser'@'%';
GRANT SELECT, INSERT, UPDATE ON restaurant_db. TO 'webuser'@'%';

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top