A vulnerability classified as critical was found in itsourcecode Restaurant Management System 1.0. This vulnerability affects unknown code of the file /admin/menu_save.php. The manipulation of the argument menu leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
References
Link | Resource |
---|---|
https://github.com/wuquwuquwuqu/CVE/issues/2 | Exploit Third Party Advisory Issue Tracking |
https://itsourcecode.com/ | Product |
https://vuldb.com/?ctiid.309412 | Permissions Required Third Party Advisory VDB Entry |
https://vuldb.com/?id.309412 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.575553 | Third Party Advisory VDB Entry |
https://github.com/wuquwuquwuqu/CVE/issues/2 | Exploit Third Party Advisory Issue Tracking |
Configurations
History
21 May 2025, 19:40
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/wuquwuquwuqu/CVE/issues/2 - Exploit, Third Party Advisory, Issue Tracking | |
References | () https://itsourcecode.com/ - Product | |
References | () https://vuldb.com/?ctiid.309412 - Permissions Required, Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?id.309412 - Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?submit.575553 - Third Party Advisory, VDB Entry | |
CPE | cpe:2.3:a:adonesevangelista:restaurant_management_system:1.0:*:*:*:*:*:*:* | |
First Time |
Adonesevangelista
Adonesevangelista restaurant Management System |
19 May 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/wuquwuquwuqu/CVE/issues/2 - |
19 May 2025, 13:35
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
18 May 2025, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-18 10:15
Updated : 2025-05-21 19:40
NVD link : CVE-2025-4870
Mitre link : CVE-2025-4870
CVE.ORG link : CVE-2025-4870
JSON object : View
Products Affected
adonesevangelista
- restaurant_management_system