Listen to this Post
How the CVE Works
CVE-2025-6482 is a critical SQL injection vulnerability in Simple Pizza Ordering System 1.0. The flaw resides in /edituser-exec.php
, where the `userid` parameter is improperly sanitized. Attackers can inject malicious SQL queries through this parameter, enabling unauthorized database access, data manipulation, or extraction. The vulnerability is remotely exploitable without authentication, increasing its severity. The exploit leverages crafted HTTP requests to bypass input validation, executing arbitrary SQL commands on the backend database.
DailyCVE Form
Platform: Simple Pizza Ordering System
Version: 1.0
Vulnerability: SQL Injection
Severity: Critical
Date: 06/25/2025
Prediction: Patch by 07/15/2025
What Undercode Say
SELECT FROM users WHERE userid = '1' OR '1'='1';
curl -X POST "http://target/edituser-exec.php" -d "userid=1' UNION SELECT 1,2,3--"
How Exploit
- Craft malicious `userid` payloads (e.g.,
1' OR 1=1--
). - Send unauthenticated HTTP requests to
/edituser-exec.php
. - Extract database contents via UNION-based SQLi.
Protection from this CVE
- Input validation/sanitization.
- Prepared statements.
- WAF rules.
Impact
- Unauthorized data access.
- Database compromise.
- Remote code execution.
Sources:
Reported By: nvd.nist.gov
Extra Source Hub:
Undercode