First published: Fri Jan 03 2025(Updated: )
A vulnerability, which was classified as critical, was found in code-projects Point of Sales and Inventory Management System 1.0. Affected is an unknown function of the file /user/minus_cart.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Code-projects Point of Sales and Inventory Management System | ||
Code-projects Point of Sales and Inventory Management System | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-0199 is classified as a critical severity vulnerability.
CVE-2025-0199 allows for SQL injection through the manipulation of the 'id' argument in the file /user/minus_cart.php.
Exploiting CVE-2025-0199 could allow an attacker to execute arbitrary SQL queries on the database.
To fix CVE-2025-0199, sanitize and validate user inputs passed to the 'id' argument in the /user/minus_cart.php file.
As of now, there is no specific information on a patch for CVE-2025-0199, so implementing secure coding practices is essential.