Impact
A flaw in the Online Product Reservation System allows an attacker to manipulate the transaction_id parameter in /order_view.php, leading to a classic SQL injection. The vulnerability arises from unsanitized input being directly incorporated into database queries, permitting data extraction or modification. The impact includes potential disclosure of customer data, transaction details, and the ability to alter or delete records if the database user has sufficient privileges.
Affected Systems
Affected product is code-projects Online Product Reservation System version 1.0. The vulnerability is present in the GET parameter handling component of the order_view.php module. No other versions or components are cited as affected.
Risk and Exploitability
The CVSS score of 6.9 indicates a medium severity, and the EPSS score of less than 1% suggests a very low probability of exploitation at the time of analysis. The vulnerability is not currently listed in the CISA KEV catalog, implying limited or no known targeted exploitation. Attackers can trigger the flaw remotely by crafting a malicious URL that includes a specially crafted transaction_id value.
OpenCVE Enrichment