CVE-2026-30529
SQL Injection in SourceCodester Online Food Ordering System
Publication date: 2026-03-27
Last updated on: 2026-03-30
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| oretnom23 | online_food_ordering_system | 1.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-89 | The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data. |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The SQL Injection vulnerability in the Online Food Ordering System allows attackers to exfiltrate sensitive data such as admin credentials, user data, and order history. This exposure of personal and potentially sensitive information can lead to non-compliance with data protection regulations like GDPR and HIPAA, which mandate the protection of personal data and require organizations to implement adequate security measures to prevent unauthorized access and data breaches.
Additionally, the ability to bypass authentication mechanisms and enumerate database schema details increases the risk of unauthorized data access and manipulation, further compromising compliance with these standards.
How can this vulnerability impact me? :
This vulnerability can have several serious impacts:
- Data exfiltration: Attackers can dump the entire SQLite database, potentially exposing sensitive information such as admin credentials, user data, and order history.
- Authentication bypass: By manipulating SQL logic, attackers may bypass authentication mechanisms.
- Database enumeration: Attackers can discover database schema details including tables and columns, which can facilitate further attacks.
Can you explain this vulnerability to me?
CVE-2026-30529 is a SQL Injection vulnerability found in the Online Food Ordering System version 1.0, specifically in the Actions.php file within the save_user action.
The vulnerability occurs because the application does not properly sanitize the "username" parameter supplied via HTTP POST requests before using it in SQL queries.
This flaw allows an authenticated attacker to inject malicious SQL commands into the backend SQLite database.
Exploitation techniques include Boolean-based blind SQL injection and Time-based blind SQL injection, which can be used to infer or extract data by manipulating query logic or causing delays.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This SQL Injection vulnerability can be detected by targeting the "username" parameter in the save_user action of the Actions.php file using SQL injection testing tools.
A common approach is to use sqlmap with appropriate headers, POST data, and cookies to automate the detection process.
Proof of concept payloads include Boolean-based blind injection and Time-based blind injection specific to SQLite.
- Boolean-based blind injection payload example: username=admin' AND 4611=4611 AND 'YtZs'='YtZs
- Time-based blind injection payload example: username=admin' AND 5832=LIKE(CHAR(65,66,67,68,69,70,71),UPPER(HEX(RANDOMBLOB(500000000/2)))) AND 'Zrsm'='Zrsm
Deploying the system locally, logging in, and running sqlmap targeting the username parameter in the save_user action is recommended to confirm the vulnerability.
What immediate steps should I take to mitigate this vulnerability?
To mitigate the SQL Injection vulnerability in the Online Food Ordering System v1.0, immediate steps include:
- Restrict or disable access to the user creation or save_user action until a patch or fix is applied.
- Implement proper input validation and sanitization on the "username" parameter to prevent malicious SQL commands.
- Use prepared statements or parameterized queries in the Actions.php file to safely handle user input.
- Monitor and review logs for suspicious activities related to the save_user action or unusual SQL queries.
- If possible, restrict authenticated user privileges to minimize the impact of exploitation.