CVE Alert: CVE-2025-9660 – SourceCodester – Bakeshop Online Ordering System

CVE-2025-9660

HIGHNo exploitation knownPoC observed

A vulnerability was found in SourceCodester Bakeshop Online Ordering System 1.0. The impacted element is an unknown function of the file /passwordrecover.php. Performing manipulation of the argument phonenumber results in sql injection. The attack is possible to be carried out remotely. The exploit has been made public and could be used.

CVSS v3.1 (7.3)
Vendor
SourceCodester
Product
Bakeshop Online Ordering System
Versions
1.0
CWE
CWE-89, SQL Injection
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Published
2025-08-29T16:32:06.943Z
Updated
2025-08-29T16:59:21.843Z

AI Summary Analysis

Risk verdict

High risk. Publicly disclosed, PoC-available SQL injection on the remote passwordrecover.php endpoint makes automated exploitation feasible without authentication.

Why this matters

The vulnerability can expose or alter customer data and orders, with potential credential compromise and broader data integrity risks. In practice, attackers could exfiltrate data or disrupt ordering operations, harming trust, compliance posture, and revenue.

Most likely attack path

Remote attacker sends crafted input to passwordrecover.php (phonenumber parameter) to trigger SQL injection. No user interaction or privileges required; impact can escalate to data leakage or modification within the database (C, I, A affected). With Scope Unchanged, exploited access remains within the same system layer, lowering barriers to automated exploitation but limiting lateral reach unless additional vulnerabilities exist.

Who is most exposed

Public-facing web deployments of SourceCodester Bakeshop Online Ordering System on common LAMP stacks, often hosted by small businesses or shared hosting. Internet-exposed endpoints increase risk, especially where input handling is not parameterised.

Detection ideas

  • Anomalous requests to passwordrecover.php with unusual phonenumber values (quotes, unions, or sleep-based payloads).
  • Database error messages or stack traces in responses or logs.
  • Sudden spikes in failed or unusual authentication-related queries.
  • WAF logs showing SQL injection patterns targeting passwordrecover.php.
  • PoC indicators or signatures from threat intel feeds and public exploits.

Mitigation and prioritisation

  • Apply available patch or upgrade to fixed version; if unavailable, implement compensating controls.
  • Enforce parameterised queries and input validation on passwordrecover.php; disable or harden the endpoint if feasible.
  • Deploy WAF rules tailored to SQL injection for that path; monitor and alert on suspicious payloads.
  • Restrict access to the endpoint behind authentication or network allowlists where possible.
  • Change-management: test fixes in staging, then rollout with monitoring. If KEV true or EPSS ≥ 0.5 (data not provided here), treat as priority 1.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.