Simple Pizza Ordering System, SQL Injection, CVE-2025-6482 (Critical)

Listen to this Post

How the CVE Works

CVE-2025-6482 is a critical SQL injection vulnerability in Simple Pizza Ordering System 1.0. The flaw resides in /edituser-exec.php, where the `userid` parameter is improperly sanitized. Attackers can inject malicious SQL queries through this parameter, enabling unauthorized database access, data manipulation, or extraction. The vulnerability is remotely exploitable without authentication, increasing its severity. The exploit leverages crafted HTTP requests to bypass input validation, executing arbitrary SQL commands on the backend database.

DailyCVE Form

Platform: Simple Pizza Ordering System
Version: 1.0
Vulnerability: SQL Injection
Severity: Critical
Date: 06/25/2025

Prediction: Patch by 07/15/2025

What Undercode Say

SELECT FROM users WHERE userid = '1' OR '1'='1';
curl -X POST "http://target/edituser-exec.php" -d "userid=1' UNION SELECT 1,2,3--"

How Exploit

  • Craft malicious `userid` payloads (e.g., 1' OR 1=1--).
  • Send unauthenticated HTTP requests to /edituser-exec.php.
  • Extract database contents via UNION-based SQLi.

Protection from this CVE

  • Input validation/sanitization.
  • Prepared statements.
  • WAF rules.

Impact

  • Unauthorized data access.
  • Database compromise.
  • Remote code execution.

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top