Description
A SQL Injection vulnerability exists in SourceCodester Online Food Ordering System v1.0 in the admin/manage_product.php file via the "id" parameter.
Published: 2026-03-27
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Data Breach
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is a classic SQL Injection (CWE‑89) that allows an attacker to inject arbitrary SQL through the "id" parameter in the admin/manage_product.php page. By exploiting this flaw, a malicious actor could read sensitive data, modify or delete database records, and potentially execute destructive commands that compromise data integrity and availability. The impact is primarily the unauthorized disclosure of confidential information and the risk of unauthorized manipulation of the application’s data store.

Affected Systems

SourceCodester Online Food Ordering System version 1.0 is affected. The issue resides in the admin/manage_product.php module and can be accessed by any user who can supply a value to the "id" parameter in the HTTP request.

Risk and Exploitability

The CVSS score of 9.8 indicates a critical severity, and the EPSS score of less than 1% reflects a low probability of exploitation in the wild, though the flaw is known and could be leveraged if the attacker gains network access. The vulnerability is not yet listed in the CISA KEV catalog, so there is no evidence of a widespread, targeted exploitation campaign. The likely attack vector is over the network via HTTP(s), targeting the vulnerable parameter without needing prior authentication.

Generated by OpenCVE AI on March 30, 2026 at 19:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply an update or patch from SourceCodester that properly sanitizes or parameterizes the "id" input in admin/manage_product.php.
  • If an official patch is not available, limit access to the admin/manage_product.php endpoint to authenticated administrators only and consider implementing role‑based access control.
  • Use input validation to ensure the "id" parameter contains only expected numeric values, rejecting or escaping any other input.
  • Configure the database to use least‑privilege accounts so that even if SQL injection succeeds, the damage is limited.

Generated by OpenCVE AI on March 30, 2026 at 19:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 31 Mar 2026 03:00:00 +0000

Type Values Removed Values Added
Title SQL Injection in SourceCodester Online Food Ordering System Admin Manage Product

Mon, 30 Mar 2026 18:30:00 +0000

Type Values Removed Values Added
First Time appeared Oretnom23
Oretnom23 online Food Ordering System
CPEs cpe:2.3:a:oretnom23:online_food_ordering_system:1.0:*:*:*:*:*:*:*
Vendors & Products Oretnom23
Oretnom23 online Food Ordering System

Mon, 30 Mar 2026 08:15:00 +0000

Type Values Removed Values Added
First Time appeared Sourcecodester
Sourcecodester online Food Ordering System
Vendors & Products Sourcecodester
Sourcecodester online Food Ordering System

Sun, 29 Mar 2026 20:45:00 +0000

Type Values Removed Values Added
Title SQL Injection in SourceCodester Online Food Ordering System Admin/manage_product.php

Sat, 28 Mar 2026 03:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-89
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 27 Mar 2026 20:30:00 +0000

Type Values Removed Values Added
Title SQL Injection in SourceCodester Online Food Ordering System Admin/manage_product.php

Fri, 27 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
Description A SQL Injection vulnerability exists in SourceCodester Online Food Ordering System v1.0 in the admin/manage_product.php file via the "id" parameter.
References

Subscriptions

Oretnom23 Online Food Ordering System
Sourcecodester Online Food Ordering System
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-03-27T20:13:29.182Z

Reserved: 2026-03-04T00:00:00.000Z

Link: CVE-2026-30533

cve-icon Vulnrichment

Updated: 2026-03-27T20:12:51.780Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-27T16:16:23.917

Modified: 2026-03-30T18:17:38.850

Link: CVE-2026-30533

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-30T20:57:16Z

Weaknesses