Simple Pizza Ordering System, SQL Injection, CVE-2025-6479 (Critical)

Listen to this Post

How the CVE Works

CVE-2025-6479 is a critical SQL injection vulnerability in Simple Pizza Ordering System 1.0. The flaw exists in the `/salesreport.php` file where the `dayfrom` parameter is not properly sanitized before being used in SQL queries. Attackers can craft malicious input containing SQL commands that will be executed directly on the database when the parameter is processed. This allows remote attackers to read, modify, or delete database contents without authentication. The vulnerability is particularly dangerous as it can be exploited remotely with no privileges required and no user interaction needed.

DailyCVE Form

Platform: Simple Pizza Ordering
Version: 1.0
Vulnerability: SQL Injection
Severity: Critical
Date: 06/25/2025

Prediction: Patch by 07/15/2025

What Undercode Say

SELECT FROM orders WHERE date BETWEEN '[bash]' AND '[bash]'
payload = "1' UNION SELECT 1,2,3,4,5,table_name FROM information_schema.tables-- -"

How Exploit

1. Identify vulnerable endpoint `/salesreport.php`

2. Craft malicious `dayfrom` parameter

3. Send HTTP GET request with payload

4. Extract database information

5. Escalate to full system compromise

Protection from this CVE

1. Input validation

2. Parameterized queries

3. WAF rules

4. Patch update

Impact

1. Data theft

2. System compromise

3. Unauthorized access

4. Data manipulation

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top