Submit #659661: projectworlds Online Shopping System 1.0 SQL Injectioninfo

Titleprojectworlds Online Shopping System 1.0 SQL Injection
DescriptionDuring the security assessment of "Shopping Cart System", I detected a critical SQL injection vulnerability in the "success.php" file. This vulnerability is attributed to the insufficient validation of user input for the "id" parameter. This inadequacy enables attackers to inject malicious SQL queries. Consequently, attackers can access the database without proper authorization, modify or delete data, and obtain sensitive information. Immediate corrective actions are essential to safeguard system security and uphold data integrity.
Source⚠️ https://github.com/underatted/CVE/issues/7
User
 underatted (UID 90321)
Submission09/21/2025 15:56 (7 months ago)
Moderation09/26/2025 14:12 (5 days later)
StatusDuplicate
VulDB entry283805 [Project Worlds Free Download Online Shopping System up to 192.168.1.88 success.php ID sql injection]
Points0

Do you want to use VulDB in your project?

Use the official API to access entries easily!