A vulnerability has been found in itsourcecode Restaurant Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/finished.php. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
References
Link | Resource |
---|---|
https://github.com/swws141/CVE/issues/1 | Exploit Third Party Advisory Issue Tracking |
https://itsourcecode.com/ | Product |
https://vuldb.com/?ctiid.309406 | Permissions Required Third Party Advisory VDB Entry |
https://vuldb.com/?id.309406 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.575465 | Third Party Advisory VDB Entry |
https://github.com/swws141/CVE/issues/1 | Exploit Third Party Advisory Issue Tracking |
Configurations
History
21 May 2025, 19:40
Type | Values Removed | Values Added |
---|---|---|
First Time |
Adonesevangelista
Adonesevangelista restaurant Management System |
|
References | () https://github.com/swws141/CVE/issues/1 - Exploit, Third Party Advisory, Issue Tracking | |
References | () https://itsourcecode.com/ - Product | |
References | () https://vuldb.com/?ctiid.309406 - Permissions Required, Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?id.309406 - Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?submit.575465 - Third Party Advisory, VDB Entry | |
CPE | cpe:2.3:a:adonesevangelista:restaurant_management_system:1.0:*:*:*:*:*:*:* |
19 May 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/swws141/CVE/issues/1 - |
19 May 2025, 13:35
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
18 May 2025, 07:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-18 07:15
Updated : 2025-05-21 19:40
NVD link : CVE-2025-4864
Mitre link : CVE-2025-4864
CVE.ORG link : CVE-2025-4864
JSON object : View
Products Affected
adonesevangelista
- restaurant_management_system