CVE-2026-24494

Order Up · Online Ordering System

An unauthenticated SQL injection vulnerability exists in the Order Up Online Ordering System 1.0 via the store_id parameter in the /api/integrations/getintegrations endpoint.

Executive summary

The Order Up Online Ordering System 1.0 is vulnerable to a critical unauthenticated SQL injection that allows remote attackers to compromise the backend database.

Vulnerability

This vulnerability is a classic SQL injection residing in the /api/integrations/getintegrations endpoint. An unauthenticated attacker can submit a crafted POST request containing malicious SQL code within the store_id parameter to manipulate database queries.

Business impact

A successful exploit poses a severe risk to data integrity and confidentiality. Attackers could extract sensitive customer information, financial records, or administrative credentials, leading to a total compromise of the application's backend. The CVSS score of 9.8 reflects the critical nature of this flaw, as it requires no authentication and can be executed remotely.

Remediation

Immediate Action: Update the Online Ordering System to the latest available version or apply the vendor-supplied security patch immediately to sanitize the store_id parameter.

Proactive Monitoring: Enable detailed database activity logging and monitor for unusual query patterns or unexpected error messages originating from the API integration endpoints.

Compensating Controls: Deploy a Web Application Firewall (WAF) with SQL injection protection rules to filter and block malicious POST requests targeting the affected endpoint.

Exploitation status

Public Exploit Available: false

Analyst recommendation

The severity of this SQL injection cannot be overstated, as it provides a direct path to the organization's sensitive data. Security teams must prioritize the application of the vendor's patch. If a patch is not immediately available, the affected endpoint should be disabled or restricted to known, trusted IP addresses until the vulnerability is resolved.