A weakness has been identified in code-projects Refugee Food Management System 1.0. This affects an unknown part of the file /home/editfood.php. This manipulation of the argument a/b/c/d causes sql injection. The attack may be initiated remotely. The exploit has been made available to the public and could be exploited.
References
| Link | Resource |
|---|---|
| https://code-projects.org/ | Product |
| https://github.com/YZS17/CVE/blob/main/Refugee%20Food_Management_System/sqli_editfood.php.md | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.338594 | Permissions Required VDB Entry |
| https://vuldb.com/?id.338594 | VDB Entry Third Party Advisory |
| https://vuldb.com/?submit.722803 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.724713 | Third Party Advisory VDB Entry |
| https://github.com/YZS17/CVE/blob/main/Refugee%20Food_Management_System/sqli_editfood.php.md | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-12-29 23:15
Updated : 2026-01-02 14:00
NVD link : CVE-2025-15209
Mitre link : CVE-2025-15209
CVE.ORG link : CVE-2025-15209
JSON object : View
Products Affected
fabian
- refugee_food_management_system
