Impact
An attacker can manipulate the arguments orggrandTotal, vat, service_charge, or grandtotal in the /hungry/placeorder endpoint, causing the system to compute incorrect totals or apply wrong charges during checkout. This produces a business logic error that could lead to financial losses for the restaurant chain or its customers.
Affected Systems
The vulnerability affects Bdtask’s Bhojon All-In-One Restaurant Management System versions up to build 20260116. Users of the checkout component that includes the /hungry/placeorder handler are directly impacted.
Risk and Exploitability
The CVSS score of 5.3 indicates a moderate severity, and the EPSS score of less than 1% suggests a low likelihood of exploitation. The vendor has not issued an official patch, and the vulnerability can be exploited remotely via crafted HTTP requests. While the vulnerability is not in the KEV catalog, the lack of vendor response elevates the risk of undetected exploitation.
OpenCVE Enrichment