Description
A weakness has been identified in code-projects Online Ordering System 1.0. The impacted element is an unknown function of the file /user_contact.php. This manipulation of the argument Name causes sql injection. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited.
Problem types
Product status
Timeline
| 2025-12-08: | Advisory disclosed |
| 2025-12-08: | VulDB entry created |
| 2025-12-08: | VulDB entry last update |
Credits
zzb1 (VulDB User)
References
github.com/zzb1388/cve/issues/94
vuldb.com/?id.334760 (VDB-334760 | code-projects Online Ordering System user_contact.php sql injection)
vuldb.com/?ctiid.334760 (VDB-334760 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.702466 (Submit #702466 | code-projects Online Ordering System V1.0 SQL injection)
github.com/zzb1388/cve/issues/94
code-projects.org/