Severity
6.9MEDIUM
EPSS
0.1%
top 84.56%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 8

Description

A weakness has been identified in code-projects Online Ordering System 1.0. The impacted element is an unknown function of the file /user_contact.php. This manipulation of the argument Name causes sql injection. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited.

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N

Affected Packages2 packages

🔴Vulnerability Details

2
CVEList
code-projects Online Ordering System user_contact.php sql injection2025-12-08
GHSA
GHSA-hrr6-37mf-r428: A weakness has been identified in code-projects Online Ordering System 12025-12-08

📋Vendor Advisories

1
Microsoft
An issue was discovered in GNU libiberty as distributed in GNU Binutils 2.32. simple_object_elf_match in simple-object-elf.c does not check for a zero shstrndx value leading to an integer overflow and2019-07-09
CVE-2025-14250 (MEDIUM CVSS 6.9) | A weakness has been identified in c | cvebase.io