Description
A vulnerability has been found in SourceCodester Food Ordering System 1.0. This affects an unknown function of the file /purchase.php of the component Parameter Handler. The manipulation of the argument custom leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
Published: 2026-03-26
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL Injection
Action: Immediate Patch
AI Analysis

Impact

A flaw in the SourceCodester Food Ordering System version 1.0 allows an attacker to inject arbitrary SQL via the custom parameter in the file purchase.php. The vulnerability resides in an unspecified function within the Parameter Handler component, and the injection can lead to unauthorized data access or modification. This weakness aligns with CWE-74 and CWE-89, representing improper handling of input and the creation of untrusted SQL statements.

Affected Systems

The issue affects the SourceCodester Food Ordering System 1.0, specifically the purchase.php module that processes user supplied custom parameters. Users running this version on any environment without an applied patch are in direct danger.

Risk and Exploitability

The CVSS score of 6.9 indicates a medium severity impact; with no EPSS data the likelihood cannot be quantified, but the vulnerability has been publicly disclosed and could be exploited remotely by sending crafted requests. The attack vector is inferred to be remote, as the description states the attack can be initiated remotely. Because the vulnerability is not in the CISA KEV catalog, it may not yet have known active exploits, but the potential for data compromise remains.

Generated by OpenCVE AI on March 26, 2026 at 04:18 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor’s patch or upgrade to a newer version of the application as soon as it is released.
  • If a patch is unavailable, restrict access to the purchase.php endpoint or the parameter handling functionality to trusted administrators.
  • Implement input validation and use parameterized queries in the application code to prevent future injection attempts.

Generated by OpenCVE AI on March 26, 2026 at 04:18 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 26 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 26 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Sourcecodester
Sourcecodester food Ordering System
Vendors & Products Sourcecodester
Sourcecodester food Ordering System

Thu, 26 Mar 2026 03:45:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in SourceCodester Food Ordering System 1.0. This affects an unknown function of the file /purchase.php of the component Parameter Handler. The manipulation of the argument custom leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
Title SourceCodester Food Ordering System Parameter purchase.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Sourcecodester Food Ordering System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-26T14:00:28.211Z

Reserved: 2026-03-25T14:30:21.273Z

Link: CVE-2026-4839

cve-icon Vulnrichment

Updated: 2026-03-26T14:00:23.180Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-26T04:17:15.053

Modified: 2026-03-30T13:26:50.827

Link: CVE-2026-4839

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-26T12:08:41Z

Weaknesses