Description
SQL injection vulnerability in CafeEngine allows remote attackers to execute arbitrary SQL commands via the id parameter to (1) dish.php and (2) menu.php.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by 0xFFFFFF · textwebappsphp
https://www.exploit-db.com/exploits/6762
References (5)
Core 5
Core References
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/32308
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/31786
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/6762
Third Party Advisory third-party-advisory
x_refsource_sreason
http://securityreason.com/securityalert/4434
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/45929
Scores
EPSS
0.0051
EPSS Percentile
66.4%
Details
CWE
CWE-89
Status
published
Products (1)
cafeengine/easycafeengine
1.1
Published
Oct 18, 2008
Tracked Since
Feb 18, 2026