Description
A vulnerability was determined in Bdtask Bhojon All-In-One Restaurant Management System up to 20260116. The affected element is an unknown function of the file /hungry/placeorder of the component Checkout. Executing a manipulation of the argument orggrandTotal/vat/service_charge/grandtotal can lead to business logic errors. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-01-29
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Business logic error leading to incorrect billing
Action: Patch ASAP
AI Analysis

Impact

An attacker can manipulate the arguments orggrandTotal, vat, service_charge, or grandtotal in the /hungry/placeorder endpoint, causing the system to compute incorrect totals or apply wrong charges during checkout. This produces a business logic error that could lead to financial losses for the restaurant chain or its customers.

Affected Systems

The vulnerability affects Bdtask’s Bhojon All-In-One Restaurant Management System versions up to build 20260116. Users of the checkout component that includes the /hungry/placeorder handler are directly impacted.

Risk and Exploitability

The CVSS score of 5.3 indicates a moderate severity, and the EPSS score of less than 1% suggests a low likelihood of exploitation. The vendor has not issued an official patch, and the vulnerability can be exploited remotely via crafted HTTP requests. While the vulnerability is not in the KEV catalog, the lack of vendor response elevates the risk of undetected exploitation.

Generated by OpenCVE AI on April 18, 2026 at 01:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Deploy the latest version of Bhojon All-In-One Restaurant Management System that contains the fix for the /placeorder logic error
  • Implement strict authentication and authorization checks on the /hungry/placeorder endpoint to prevent unauthorized manipulation of ordering parameters
  • Audit transaction logs for anomalies such as repeated incorrect totals or omitted charges and investigate any discrepancies promptly

Generated by OpenCVE AI on April 18, 2026 at 01:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 19 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:bdtask:bhojon:*:*:*:*:*:*:*:*

Fri, 30 Jan 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Bdtask
Bdtask bhojon
Vendors & Products Bdtask
Bdtask bhojon

Thu, 29 Jan 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 29 Jan 2026 18:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in Bdtask Bhojon All-In-One Restaurant Management System up to 20260116. The affected element is an unknown function of the file /hungry/placeorder of the component Checkout. Executing a manipulation of the argument orggrandTotal/vat/service_charge/grandtotal can lead to business logic errors. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
Title Bdtask Bhojon All-In-One Restaurant Management System Checkout placeorder logic error
Weaknesses CWE-840
References
Metrics cvssV2_0

{'score': 4, 'vector': 'AV:N/AC:L/Au:S/C:N/I:P/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:06:08.855Z

Reserved: 2026-01-29T08:44:41.146Z

Link: CVE-2026-1599

cve-icon Vulnrichment

Updated: 2026-01-29T21:19:44.169Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-29T18:16:14.570

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-1599

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T01:30:16Z

Weaknesses