Description
A SQL Injection vulnerability exists in SourceCodester Online Food Ordering System v1.0 in the Actions.php file (specifically the save_customer action). The application fails to properly sanitize user input supplied to the "username" parameter. This allows an attacker to inject malicious SQL commands.
Published: 2026-03-27
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Data Compromise
Action: Patch Immediately
AI Analysis

Impact

The vulnerability is a classic SQL Injection in the Username field of the save_customer action of the Online Food Ordering System version 1.0. An attacker can embed malicious SQL code, potentially allowing them to read, modify, or delete data from the database. This weakness directly compromises confidentiality and integrity of the underlying data store.

Affected Systems

The affected product is Online Food Ordering System 1.0, developed by Oretnom23, as identified by the base CPE string for that application.

Risk and Exploitability

The CVSS score of 9.8 indicates a critical level of severity. The EPSS score below 1% suggests a low probability of exploitation in the wild, and the vulnerability is not yet listed in the CISA KEV catalog. Based on the description, it is inferred that the attack vector is remote, via an unauthenticated HTTP request that supplies a crafted username value.

Generated by OpenCVE AI on March 30, 2026 at 19:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check the vendor’s website or repository for an official patch or update and apply it as soon as one is released.
  • Refactor the application to use parameterized queries or prepared statements for all database interactions, ensuring user input is never directly concatenated into SQL statements.
  • Ensure the database user account used by the application has the least privileges necessary, restricting write and delete permissions where possible.
  • Implement input validation to reject unexpected characters in the username field.
  • Monitor application logs for anomalous database activity and set up alerts for SQL errors or unusual query patterns.

Generated by OpenCVE AI on March 30, 2026 at 19:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 31 Mar 2026 03:00:00 +0000

Type Values Removed Values Added
Title SQL Injection in Online Food Ordering System Allowing Unauthorized Database Access

Mon, 30 Mar 2026 18:30:00 +0000

Type Values Removed Values Added
First Time appeared Oretnom23
Oretnom23 online Food Ordering System
CPEs cpe:2.3:a:oretnom23:online_food_ordering_system:1.0:*:*:*:*:*:*:*
Vendors & Products Oretnom23
Oretnom23 online Food Ordering System

Mon, 30 Mar 2026 08:15:00 +0000

Type Values Removed Values Added
First Time appeared Sourcecodester
Sourcecodester online Food Ordering System
Vendors & Products Sourcecodester
Sourcecodester online Food Ordering System

Sun, 29 Mar 2026 20:45:00 +0000

Type Values Removed Values Added
Title SQL Injection in SourceCodester Online Food Ordering System v1.0

Fri, 27 Mar 2026 20:30:00 +0000

Type Values Removed Values Added
Title SQL Injection in SourceCodester Online Food Ordering System v1.0

Fri, 27 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-89
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 27 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Description A SQL Injection vulnerability exists in SourceCodester Online Food Ordering System v1.0 in the Actions.php file (specifically the save_customer action). The application fails to properly sanitize user input supplied to the "username" parameter. This allows an attacker to inject malicious SQL commands.
References

Subscriptions

Oretnom23 Online Food Ordering System
Sourcecodester Online Food Ordering System
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-03-27T19:57:58.182Z

Reserved: 2026-03-04T00:00:00.000Z

Link: CVE-2026-30530

cve-icon Vulnrichment

Updated: 2026-03-27T19:56:48.935Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-27T16:16:23.567

Modified: 2026-03-30T18:18:27.710

Link: CVE-2026-30530

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-30T20:57:12Z

Weaknesses