CVE-2026-24494

9.8 CRITICAL
Published: February 23, 2026 Modified: February 23, 2026
View on NVD

Description

SQL Injection vulnerability in the /api/integrations/getintegrations endpoint of Order Up Online Ordering System 1.0 allows an unauthenticated attacker to access sensitive backend database data via a crafted store_id parameter in a POST request.

AI Explanation

### 1. Plain-Language Summary This vulnerability allows an unauthenticated attacker to send a specially crafted request to the server, tricking it into revealing sensitive data from the backend database. Attackers exploit a flaw in the API endpoint where user input isn’t properly checked before executing database commands. ### 2. Who Is Affected **Product/Version**: Order Up Online Ordering System version **1.0**. Any organization using this specific version is vulnerable. Other versions are not mentioned and may or may not be affected. ### 3. What an Attacker Could Do An attacker could: - **Extract sensitive data** (e.g., customer PII, payment details, order history, or admin credentials) from the database. - **Modify or delete data** if the database permissions allow write operations. - **Potentially gain full control** of the database by chaining this with other exploits (though the primary risk here is data exfiltration). ### 4. Recommended Remediation Steps - **Patch Immediately**: Apply vendor patches or upgrade to a fixed version (if available beyond 1.0). - **Temporary Mitigation**: Block access to the vulnerable endpoint (`/api/integrations/getintegrations`) via firewall/WAF rules if patching is delayed. - **Input Validation**: Ensure all user-supplied parameters (like `store_id`) undergo strict input sanitization and parameterized queries to prevent SQL injection. - **Least Privilege**: Restrict database account permissions to minimize exposure if compromised. - **Audit Logs**: Monitor logs for suspicious POST requests to the endpoint

Generated: 2026-02-23 03:31

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory

1 reference(s) from NVD

Quick Stats

CVSS v3 Score
9.8 / 10.0
EPSS (Exploit Probability)
0.1%
21th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)