CVE-2025-11604
Food · Food Multiple Products, specifically projectworlds Online Ordering Food System 1.
A high-severity vulnerability has been identified in the Online Ordering Food System used by multiple Food products.
Executive summary
A high-severity vulnerability has been identified in the Online Ordering Food System used by multiple Food products. Successful exploitation of this flaw could allow an attacker to compromise the system, potentially leading to unauthorized access to sensitive customer or order information and disruption of online ordering services.
Vulnerability
The provided description is generic; however, a vulnerability in an online ordering system with a CVSS score of 7.3 typically involves a flaw such as SQL Injection (SQLi). An attacker could likely exploit this by submitting specially crafted input to web application fields (e.g., search bars, login forms, or parameter values in the URL). This malicious input could be interpreted as a database command, allowing the attacker to bypass authentication, read sensitive data from the database (including customer PII, order history, and credentials), modify or delete data, and in some cases, execute commands on the underlying operating system.
Business impact
This vulnerability is rated as High severity with a CVSS score of 7.3. Successful exploitation could lead to significant business consequences, including the breach of sensitive customer data, which may trigger regulatory fines under data protection laws like GDPR or CCPA. Such an incident would result in a loss of customer trust, brand reputation damage, and potential financial losses from fraudulent activity or business disruption. An attacker modifying or deleting order data could also directly impact revenue and daily operations.
Remediation
Immediate Action: The primary remediation is to apply the security updates provided by the vendor across all affected systems without delay. After patching, it is crucial to verify that the patch has been successfully applied and the vulnerability is resolved.
Proactive Monitoring: Security teams should actively monitor web server, application, and database logs for signs of exploitation attempts. Look for unusual or malformed requests, especially those containing SQL keywords (SELECT, UNION, ' OR '1'='1'), and an abnormal volume of queries or errors originating from a single IP address.
Compensating Controls: If immediate patching is not feasible, deploy a Web Application Firewall (WAF) with rules configured to detect and block SQL injection attacks. Additionally, ensure the application's database service account is configured with the principle of least privilege to limit the impact of a potential compromise.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Given the High severity (CVSS 7.3) of this vulnerability and its presence in a critical, public-facing online ordering system, we recommend that organizations treat this as a high-priority issue. Although this CVE is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, its potential impact on data confidentiality and business operations warrants immediate patching. All remediation and monitoring actions outlined in this report should be implemented immediately to mitigate risk to the organization.