CVE-2025-4881

A vulnerability was found in itsourcecode Restaurant Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/user_save.php. The manipulation of the argument username/name leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
References
Link Resource
https://github.com/Cherish-Ink/CVE/issues/1 Exploit Third Party Advisory Issue Tracking
https://itsourcecode.com/ Product
https://vuldb.com/?ctiid.309434 Permissions Required Third Party Advisory VDB Entry
https://vuldb.com/?id.309434 Third Party Advisory VDB Entry
https://vuldb.com/?submit.576284 Third Party Advisory VDB Entry
https://github.com/Cherish-Ink/CVE/issues/1 Exploit Third Party Advisory Issue Tracking
Configurations

Configuration 1 (hide)

cpe:2.3:a:adonesevangelista:restaurant_management_system:1.0:*:*:*:*:*:*:*

History

21 May 2025, 19:38

Type Values Removed Values Added
First Time Adonesevangelista
Adonesevangelista restaurant Management System
References () https://github.com/Cherish-Ink/CVE/issues/1 - () https://github.com/Cherish-Ink/CVE/issues/1 - Exploit, Third Party Advisory, Issue Tracking
References () https://itsourcecode.com/ - () https://itsourcecode.com/ - Product
References () https://vuldb.com/?ctiid.309434 - () https://vuldb.com/?ctiid.309434 - Permissions Required, Third Party Advisory, VDB Entry
References () https://vuldb.com/?id.309434 - () https://vuldb.com/?id.309434 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.576284 - () https://vuldb.com/?submit.576284 - Third Party Advisory, VDB Entry
CPE cpe:2.3:a:adonesevangelista:restaurant_management_system:1.0:*:*:*:*:*:*:*

19 May 2025, 15:15

Type Values Removed Values Added
References () https://github.com/Cherish-Ink/CVE/issues/1 - () https://github.com/Cherish-Ink/CVE/issues/1 -

19 May 2025, 13:35

Type Values Removed Values Added
Summary
  • (es) Se encontró una vulnerabilidad en itsourcecode Restaurant Management System 1.0, clasificada como crítica. Este problema afecta a una funcionalidad desconocida del archivo /admin/user_save.php. La manipulación del argumento "username/name" provoca una inyección SQL. El ataque puede ejecutarse en remoto. Se ha hecho público el exploit y puede que sea utilizado.

18 May 2025, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-18 14:15

Updated : 2025-05-21 19:38


NVD link : CVE-2025-4881

Mitre link : CVE-2025-4881

CVE.ORG link : CVE-2025-4881


JSON object : View

Products Affected

adonesevangelista

  • restaurant_management_system
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')