Impact
A weakness exists in the Online Food Ordering System 1.0 that allows attackers to manipulate the del argument in the cart.php file, resulting in SQL injection. The flaw permits the alteration or retrieval of data from the underlying database, potentially exposing sensitive information, modifying order data, or causing unintended application behavior. The vulnerability is associated with CWE-74 (Improper Validation of Relative Paths or Filenames) and CWE-89 (SQL Injection).
Affected Systems
The affected product is the code-projects Online Food Ordering System, version 1.0, specifically the Shopping Cart Module accessed via cart.php. Hosts running this exact version or earlier are susceptible, while newer releases may have resolved the issue. The vendor identifying the product is code-projects.
Risk and Exploitability
The CVSS score of 6.9 reflects medium severity, indicating that exploitation can lead to significant data compromise but may not enable full system takeover. EPSS data is unavailable, and the vulnerability is not presently listed in the CISA KEV catalog. Attackers can exercise the flaw remotely by submitting crafted del values, and a public exploit is already available, underscoring that the threat is actionable.
OpenCVE Enrichment