CVE-2026-24494
Order Up · Online Ordering System
An unauthenticated SQL injection vulnerability exists in the Order Up Online Ordering System 1.0 via the store_id parameter in the /api/integrations/getintegrations endpoint.
Executive summary
The Order Up Online Ordering System 1.0 is vulnerable to a critical unauthenticated SQL injection that allows remote attackers to compromise the backend database.
Vulnerability
This vulnerability is a classic SQL injection residing in the /api/integrations/getintegrations endpoint. An unauthenticated attacker can submit a crafted POST request containing malicious SQL code within the store_id parameter to manipulate database queries.
Business impact
A successful exploit poses a severe risk to data integrity and confidentiality. Attackers could extract sensitive customer information, financial records, or administrative credentials, leading to a total compromise of the application's backend. The CVSS score of 9.8 reflects the critical nature of this flaw, as it requires no authentication and can be executed remotely.
Remediation
Immediate Action: Update the Online Ordering System to the latest available version or apply the vendor-supplied security patch immediately to sanitize the store_id parameter.
Proactive Monitoring: Enable detailed database activity logging and monitor for unusual query patterns or unexpected error messages originating from the API integration endpoints.
Compensating Controls: Deploy a Web Application Firewall (WAF) with SQL injection protection rules to filter and block malicious POST requests targeting the affected endpoint.
Exploitation status
Public Exploit Available: false
Analyst recommendation
The severity of this SQL injection cannot be overstated, as it provides a direct path to the organization's sensitive data. Security teams must prioritize the application of the vendor's patch. If a patch is not immediately available, the affected endpoint should be disabled or restricted to known, trusted IP addresses until the vulnerability is resolved.