Description
A weakness has been identified in code-projects Refugee Food Management System 1.0. This affects an unknown part of the file /home/editfood.php. This manipulation of the argument a/b/c/d causes sql injection. The attack may be initiated remotely. The exploit has been made available to the public and could be exploited.
Problem types
Product status
Timeline
| 2025-12-28: | Advisory disclosed |
| 2025-12-28: | VulDB entry created |
| 2025-12-28: | VulDB entry last update |
Credits
XU17 (VulDB User)
References
github.com/...ee Food_Management_System/sqli_editfood.php.md
vuldb.com/?id.338594 (VDB-338594 | code-projects Refugee Food Management System editfood.php sql injection)
vuldb.com/?ctiid.338594 (VDB-338594 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.722803 (Submit #722803 | code-projects Refugee Food Management System 1.0 SQL Injection)
vuldb.com/?submit.724713 (Submit #724713 | Code-projects Refugee Food Management System v1.0 SQL injection (Duplicate))
github.com/...ee Food_Management_System/sqli_editfood.php.md
code-projects.org/
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.