Impact
A flaw exists in the /search.php script of SourceCodester Online Catering Reservation 1.0. The rcode parameter is concatenated directly into a SQL query without validation, enabling attackers to inject arbitrary SQL. Successful injection can expose, alter, or delete reservation data, compromising confidentiality, integrity, and availability.
Affected Systems
The affected product is SourceCodester Online Catering Reservation version 1.0. No other versions or vendors were identified in the CNA data. The vulnerable function resides in the search.php endpoint and may be reachable from public networks.
Risk and Exploitability
The CVSS score of 6.9 indicates medium‑to‑high severity. EPSS data is not available and the vulnerability is not listed in the KEV catalog. Publicly provided exploits confirm that unauthenticated remote attackers can trigger the issue via HTTP requests to /search.php, suggesting a realistic exploitation likelihood.
OpenCVE Enrichment