CVE-2026-30529
Received Received - Intake
SQL Injection in SourceCodester Online Food Ordering System

Publication date: 2026-03-27

Last updated on: 2026-03-30

Assigner: MITRE

Description
A SQL Injection vulnerability exists in SourceCodester Online Food Ordering System v1.0 in the Actions.php file (specifically the save_user action). The application fails to properly sanitize user input supplied to the "username" parameter. This allows an authenticated attacker to inject malicious SQL commands.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-27
Last Modified
2026-03-30
Generated
2026-05-07
AI Q&A
2026-03-27
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
oretnom23 online_food_ordering_system 1.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-89 The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The SQL Injection vulnerability in the Online Food Ordering System allows attackers to exfiltrate sensitive data such as admin credentials, user data, and order history. This exposure of personal and potentially sensitive information can lead to non-compliance with data protection regulations like GDPR and HIPAA, which mandate the protection of personal data and require organizations to implement adequate security measures to prevent unauthorized access and data breaches.

Additionally, the ability to bypass authentication mechanisms and enumerate database schema details increases the risk of unauthorized data access and manipulation, further compromising compliance with these standards.


How can this vulnerability impact me? :

This vulnerability can have several serious impacts:

  • Data exfiltration: Attackers can dump the entire SQLite database, potentially exposing sensitive information such as admin credentials, user data, and order history.
  • Authentication bypass: By manipulating SQL logic, attackers may bypass authentication mechanisms.
  • Database enumeration: Attackers can discover database schema details including tables and columns, which can facilitate further attacks.

Can you explain this vulnerability to me?

CVE-2026-30529 is a SQL Injection vulnerability found in the Online Food Ordering System version 1.0, specifically in the Actions.php file within the save_user action.

The vulnerability occurs because the application does not properly sanitize the "username" parameter supplied via HTTP POST requests before using it in SQL queries.

This flaw allows an authenticated attacker to inject malicious SQL commands into the backend SQLite database.

Exploitation techniques include Boolean-based blind SQL injection and Time-based blind SQL injection, which can be used to infer or extract data by manipulating query logic or causing delays.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This SQL Injection vulnerability can be detected by targeting the "username" parameter in the save_user action of the Actions.php file using SQL injection testing tools.

A common approach is to use sqlmap with appropriate headers, POST data, and cookies to automate the detection process.

Proof of concept payloads include Boolean-based blind injection and Time-based blind injection specific to SQLite.

  • Boolean-based blind injection payload example: username=admin' AND 4611=4611 AND 'YtZs'='YtZs
  • Time-based blind injection payload example: username=admin' AND 5832=LIKE(CHAR(65,66,67,68,69,70,71),UPPER(HEX(RANDOMBLOB(500000000/2)))) AND 'Zrsm'='Zrsm

Deploying the system locally, logging in, and running sqlmap targeting the username parameter in the save_user action is recommended to confirm the vulnerability.


What immediate steps should I take to mitigate this vulnerability?

To mitigate the SQL Injection vulnerability in the Online Food Ordering System v1.0, immediate steps include:

  • Restrict or disable access to the user creation or save_user action until a patch or fix is applied.
  • Implement proper input validation and sanitization on the "username" parameter to prevent malicious SQL commands.
  • Use prepared statements or parameterized queries in the Actions.php file to safely handle user input.
  • Monitor and review logs for suspicious activities related to the save_user action or unusual SQL queries.
  • If possible, restrict authenticated user privileges to minimize the impact of exploitation.

Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart