CVE-2024-0423: CWE-79 Cross Site Scripting in CodeAstro Online Food Ordering System
A vulnerability was found in CodeAstro Online Food Ordering System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file dishes.php. The manipulation of the argument res_id leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-250442 is the identifier assigned to this vulnerability.
AI Analysis
Technical Summary
CVE-2024-0423 is a Cross Site Scripting (XSS) vulnerability identified in version 1.0 of the CodeAstro Online Food Ordering System. The vulnerability resides in the dishes.php file, specifically in the handling of the 'res_id' parameter. An attacker can manipulate this parameter to inject malicious scripts that execute in the context of the victim's browser. This vulnerability is classified under CWE-79, which pertains to improper neutralization of input leading to XSS. The attack vector is remote, requiring the attacker to trick a user into interacting with a crafted URL or input that contains the malicious payload. The vulnerability requires low privileges (PR:L) and user interaction (UI:R) to be exploited, and it does not impact confidentiality or availability but can lead to integrity issues such as session hijacking or defacement. The CVSS v3.1 base score is 3.5, indicating a low severity level. No patches have been published yet, and there are no known exploits in the wild at this time. However, the exploit details have been publicly disclosed, increasing the risk of exploitation. The vulnerability affects only version 1.0 of the product, which is an online food ordering platform, potentially exposing customers and restaurant operators to malicious script execution within their browsers.
Potential Impact
For European organizations using the CodeAstro Online Food Ordering System version 1.0, this vulnerability could lead to targeted phishing attacks, session hijacking, or unauthorized actions performed on behalf of legitimate users. While the direct impact on system confidentiality and availability is minimal, the integrity of user sessions and data can be compromised. This could damage customer trust, lead to data leakage of user credentials or personal information, and potentially facilitate further attacks such as account takeover or fraud. Given the nature of online food ordering systems, which often handle payment information and personal data, even a low-severity XSS vulnerability can have reputational and financial consequences. Additionally, regulatory compliance under GDPR requires organizations to protect personal data, and exploitation of this vulnerability could lead to violations if personal data is compromised.
Mitigation Recommendations
To mitigate this vulnerability, organizations should implement strict input validation and output encoding on the 'res_id' parameter within dishes.php to neutralize any malicious scripts. Employing Content Security Policy (CSP) headers can help reduce the impact of XSS by restricting the sources from which scripts can be loaded. Web Application Firewalls (WAFs) configured to detect and block XSS payloads targeting this parameter can provide an additional layer of defense. Since no official patch is available, organizations should consider temporarily disabling or restricting access to the affected functionality if feasible. Regular security testing, including automated scanning for XSS vulnerabilities and manual code reviews, should be conducted. Educating users about the risks of clicking on suspicious links can also reduce the likelihood of successful exploitation. Monitoring web server logs for unusual request patterns targeting 'res_id' parameters may help in early detection of attempted attacks.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands
CVE-2024-0423: CWE-79 Cross Site Scripting in CodeAstro Online Food Ordering System
Description
A vulnerability was found in CodeAstro Online Food Ordering System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file dishes.php. The manipulation of the argument res_id leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-250442 is the identifier assigned to this vulnerability.
AI-Powered Analysis
Technical Analysis
CVE-2024-0423 is a Cross Site Scripting (XSS) vulnerability identified in version 1.0 of the CodeAstro Online Food Ordering System. The vulnerability resides in the dishes.php file, specifically in the handling of the 'res_id' parameter. An attacker can manipulate this parameter to inject malicious scripts that execute in the context of the victim's browser. This vulnerability is classified under CWE-79, which pertains to improper neutralization of input leading to XSS. The attack vector is remote, requiring the attacker to trick a user into interacting with a crafted URL or input that contains the malicious payload. The vulnerability requires low privileges (PR:L) and user interaction (UI:R) to be exploited, and it does not impact confidentiality or availability but can lead to integrity issues such as session hijacking or defacement. The CVSS v3.1 base score is 3.5, indicating a low severity level. No patches have been published yet, and there are no known exploits in the wild at this time. However, the exploit details have been publicly disclosed, increasing the risk of exploitation. The vulnerability affects only version 1.0 of the product, which is an online food ordering platform, potentially exposing customers and restaurant operators to malicious script execution within their browsers.
Potential Impact
For European organizations using the CodeAstro Online Food Ordering System version 1.0, this vulnerability could lead to targeted phishing attacks, session hijacking, or unauthorized actions performed on behalf of legitimate users. While the direct impact on system confidentiality and availability is minimal, the integrity of user sessions and data can be compromised. This could damage customer trust, lead to data leakage of user credentials or personal information, and potentially facilitate further attacks such as account takeover or fraud. Given the nature of online food ordering systems, which often handle payment information and personal data, even a low-severity XSS vulnerability can have reputational and financial consequences. Additionally, regulatory compliance under GDPR requires organizations to protect personal data, and exploitation of this vulnerability could lead to violations if personal data is compromised.
Mitigation Recommendations
To mitigate this vulnerability, organizations should implement strict input validation and output encoding on the 'res_id' parameter within dishes.php to neutralize any malicious scripts. Employing Content Security Policy (CSP) headers can help reduce the impact of XSS by restricting the sources from which scripts can be loaded. Web Application Firewalls (WAFs) configured to detect and block XSS payloads targeting this parameter can provide an additional layer of defense. Since no official patch is available, organizations should consider temporarily disabling or restricting access to the affected functionality if feasible. Regular security testing, including automated scanning for XSS vulnerabilities and manual code reviews, should be conducted. Educating users about the risks of clicking on suspicious links can also reduce the likelihood of successful exploitation. Monitoring web server logs for unusual request patterns targeting 'res_id' parameters may help in early detection of attempted attacks.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2024-01-11T12:22:19.973Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0fb1484d88663aec8cc
Added to database: 5/20/2025, 6:59:07 PM
Last enriched: 7/6/2025, 1:56:22 PM
Last updated: 8/11/2025, 8:20:33 AM
Views: 15
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.