Description
A SQL Injection vulnerability exists in SourceCodester Online Food Ordering System v1.0 in the Actions.php file (specifically the save_user action). The application fails to properly sanitize user input supplied to the "username" parameter. This allows an authenticated attacker to inject malicious SQL commands.
Published: 2026-03-27
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized data access and modification via SQL injection
Action: Immediate patch
AI Analysis

Impact

The system fails to sanitize user input supplied to the "username" parameter in the save_user action within Actions.php. This flaw permits an attacker to inject malicious SQL commands, potentially allowing unauthorized reading, modifying, or deleting data in the database. The weakness is classified as CWE-89, a typical SQL injection vulnerability.

Affected Systems

The vulnerability affects the SourceCodester Online Food Ordering System, version 1.0, as identified by the provided CPE string. No other versions or vendors are listed, so only this specific release is at risk.

Risk and Exploitability

With a CVSS base score of 8.8, the vulnerability is high severity. The EPSS indicates a probability of exploitation below 1%, and it is not listed in the CISA KEV catalog. The likely attack vector is a network‑based, authenticated attack: the user must be logged in to input the vulnerable username field. Exploitation could lead to data leakage, tampering, or privilege escalation within the application.

Generated by OpenCVE AI on March 30, 2026 at 18:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply an official patch that sanitizes the username field in the save_user action.
  • Rewrite the affected code to use prepared statements or parameterized queries for all database interactions.
  • Restrict the database account used by the application to the minimum privileges required.
  • Implement input validation on the username field to block characters or patterns that could be used in SQL injection.
  • Monitor authentication and database logs for anomalous activity that may indicate exploitation attempts.

Generated by OpenCVE AI on March 30, 2026 at 18:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 31 Mar 2026 03:00:00 +0000

Type Values Removed Values Added
Title SQL Injection in SourceCodester Online Food Ordering System v1.0

Mon, 30 Mar 2026 17:30:00 +0000

Type Values Removed Values Added
First Time appeared Oretnom23
Oretnom23 online Food Ordering System
CPEs cpe:2.3:a:oretnom23:online_food_ordering_system:1.0:*:*:*:*:*:*:*
Vendors & Products Oretnom23
Oretnom23 online Food Ordering System

Mon, 30 Mar 2026 08:15:00 +0000

Type Values Removed Values Added
First Time appeared Sourcecodester
Sourcecodester online Food Ordering System
Vendors & Products Sourcecodester
Sourcecodester online Food Ordering System

Sun, 29 Mar 2026 20:45:00 +0000

Type Values Removed Values Added
Title Authenticated SQL Injection in SourceCodester Online Food Ordering System

Fri, 27 Mar 2026 20:30:00 +0000

Type Values Removed Values Added
Title Authenticated SQL Injection in SourceCodester Online Food Ordering System

Fri, 27 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-89
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 27 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Description A SQL Injection vulnerability exists in SourceCodester Online Food Ordering System v1.0 in the Actions.php file (specifically the save_user action). The application fails to properly sanitize user input supplied to the "username" parameter. This allows an authenticated attacker to inject malicious SQL commands.
References

Subscriptions

Oretnom23 Online Food Ordering System
Sourcecodester Online Food Ordering System
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-03-27T20:01:49.659Z

Reserved: 2026-03-04T00:00:00.000Z

Link: CVE-2026-30529

cve-icon Vulnrichment

Updated: 2026-03-27T20:01:20.043Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-27T16:16:23.447

Modified: 2026-03-30T17:21:20.010

Link: CVE-2026-30529

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-30T20:57:13Z

Weaknesses