VYPR
Medium severity6.3NVD Advisory· Published Apr 28, 2026· Updated Apr 29, 2026

CVE-2026-7265

CVE-2026-7265

Description

A security vulnerability has been detected in SourceCodester Pizzafy Ecommerce System 1.0. The affected element is the function Category of the file pizza/index.php?page=category. The manipulation of the argument ID leads to sql injection. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

SourceCodester Pizzafy Ecommerce System 1.0 has an SQL injection in pizza/index.php?page=category allowing remote unauthenticated exploitation.

Vulnerability

Overview

An error-based SQL injection vulnerability exists in SourceCodester Pizzafy Ecommerce System version 1.0. The flaw resides in the Category functionality of the file pizza/index.php?page=category. The id parameter passed via GET request is directly concatenated into a SELECT query without sanitization or parameterization, as shown in the vulnerable code: $cid= $_GET['id'] ?? ""; ... $conn->query("SELECT * FROM category_list where id = $cid");. This allows an attacker to inject arbitrary SQL commands [1].

Attack

Vector

The vulnerability can be exploited remotely without authentication. An attacker sends a crafted HTTP GET request to the endpoint pizzafy/index.php?page=category&id=<malicious_payload>. The application reveals database errors in its output, enabling the attacker leverages error-based SQL injection techniques to extract information from error messages. The exploit has been publicly disclosed, increasing the risk of active attacks [1].

Impact

Successful exploitation can lead to full disclosure of the database schema and user credentials (confidentiality), unauthorized modification or deletion of records (integrity), and potential denial of service through mass deletion. It may also enable privilege escalation via session data extraction, potentially enabling administrator-level access [1].

Mitigation

As of the publication date, no official patch has been released. The vendor SourceCodester has not addressed this vulnerability. Users should apply input sanitization and use prepared statements (parameterized queries) for all database operations. Given the public exploit, this vulnerability may be added to CISA's Known Exploited Vulnerabilities (KEV) catalog in the future [1].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.