CVE-2025-0295: Cross Site Scripting in code-projects Online Book Shop
A vulnerability was found in code-projects Online Book Shop 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /booklist.php?subcatid=1. The manipulation of the argument subcatnm leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-0295 is a cross-site scripting (XSS) vulnerability identified in version 1.0 of the code-projects Online Book Shop application. The vulnerability resides in the /booklist.php script, specifically in the handling of the 'subcatnm' parameter. Improper input validation or output encoding of this parameter allows an attacker to inject malicious scripts that execute in the context of the victim's browser. This type of vulnerability can be exploited remotely without requiring user interaction or authentication, as indicated by the CVSS vector. The CVSS 4.0 base score is 5.3, categorizing it as a medium severity issue. The vulnerability impacts the confidentiality and integrity of user data by enabling attackers to steal session cookies, perform actions on behalf of users, or redirect users to malicious sites. The vulnerability does not affect system availability directly and does not require privileges or user interaction, making it easier to exploit. Although no known exploits are currently reported in the wild, the public disclosure of the vulnerability increases the risk of exploitation. The lack of a patch or mitigation guidance from the vendor further elevates the urgency for affected organizations to implement protective measures.
Potential Impact
For European organizations using the code-projects Online Book Shop version 1.0, this XSS vulnerability poses a risk primarily to the confidentiality and integrity of user data. Attackers could hijack user sessions, steal sensitive information such as login credentials or personal data, and manipulate the user experience to conduct phishing or fraud. This is particularly concerning for e-commerce platforms where customer trust and data protection are paramount. The vulnerability could also be leveraged as a foothold for further attacks within the organization's network if administrative users are targeted. Given the remote exploitability without authentication, attackers can target any user visiting the vulnerable web page, increasing the attack surface. The impact is heightened in the context of GDPR compliance, as data breaches involving personal data could lead to regulatory penalties and reputational damage. However, since the vulnerability does not affect availability or require user interaction, the operational disruption risk is limited but not negligible.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize the following actions: 1) Immediate input validation and output encoding: Implement strict server-side validation of the 'subcatnm' parameter to reject or sanitize malicious input. Use context-appropriate output encoding (e.g., HTML entity encoding) before rendering user-supplied data in the browser. 2) Web Application Firewall (WAF): Deploy or update WAF rules to detect and block malicious payloads targeting the 'subcatnm' parameter. 3) Content Security Policy (CSP): Implement a robust CSP header to restrict the execution of unauthorized scripts and reduce the impact of XSS attacks. 4) User awareness: Educate users about the risks of clicking suspicious links and encourage the use of updated browsers with built-in XSS protections. 5) Vendor engagement: Contact the vendor for patches or updates and monitor for official fixes. If no patch is available, consider upgrading to a newer, secure version or migrating to alternative platforms. 6) Regular security testing: Conduct periodic vulnerability assessments and penetration testing focusing on input validation and XSS vectors. These measures go beyond generic advice by focusing on the specific vulnerable parameter and leveraging layered defenses.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-0295: Cross Site Scripting in code-projects Online Book Shop
Description
A vulnerability was found in code-projects Online Book Shop 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /booklist.php?subcatid=1. The manipulation of the argument subcatnm leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-0295 is a cross-site scripting (XSS) vulnerability identified in version 1.0 of the code-projects Online Book Shop application. The vulnerability resides in the /booklist.php script, specifically in the handling of the 'subcatnm' parameter. Improper input validation or output encoding of this parameter allows an attacker to inject malicious scripts that execute in the context of the victim's browser. This type of vulnerability can be exploited remotely without requiring user interaction or authentication, as indicated by the CVSS vector. The CVSS 4.0 base score is 5.3, categorizing it as a medium severity issue. The vulnerability impacts the confidentiality and integrity of user data by enabling attackers to steal session cookies, perform actions on behalf of users, or redirect users to malicious sites. The vulnerability does not affect system availability directly and does not require privileges or user interaction, making it easier to exploit. Although no known exploits are currently reported in the wild, the public disclosure of the vulnerability increases the risk of exploitation. The lack of a patch or mitigation guidance from the vendor further elevates the urgency for affected organizations to implement protective measures.
Potential Impact
For European organizations using the code-projects Online Book Shop version 1.0, this XSS vulnerability poses a risk primarily to the confidentiality and integrity of user data. Attackers could hijack user sessions, steal sensitive information such as login credentials or personal data, and manipulate the user experience to conduct phishing or fraud. This is particularly concerning for e-commerce platforms where customer trust and data protection are paramount. The vulnerability could also be leveraged as a foothold for further attacks within the organization's network if administrative users are targeted. Given the remote exploitability without authentication, attackers can target any user visiting the vulnerable web page, increasing the attack surface. The impact is heightened in the context of GDPR compliance, as data breaches involving personal data could lead to regulatory penalties and reputational damage. However, since the vulnerability does not affect availability or require user interaction, the operational disruption risk is limited but not negligible.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize the following actions: 1) Immediate input validation and output encoding: Implement strict server-side validation of the 'subcatnm' parameter to reject or sanitize malicious input. Use context-appropriate output encoding (e.g., HTML entity encoding) before rendering user-supplied data in the browser. 2) Web Application Firewall (WAF): Deploy or update WAF rules to detect and block malicious payloads targeting the 'subcatnm' parameter. 3) Content Security Policy (CSP): Implement a robust CSP header to restrict the execution of unauthorized scripts and reduce the impact of XSS attacks. 4) User awareness: Educate users about the risks of clicking suspicious links and encourage the use of updated browsers with built-in XSS protections. 5) Vendor engagement: Contact the vendor for patches or updates and monitor for official fixes. If no patch is available, consider upgrading to a newer, secure version or migrating to alternative platforms. 6) Regular security testing: Conduct periodic vulnerability assessments and penetration testing focusing on input validation and XSS vectors. These measures go beyond generic advice by focusing on the specific vulnerable parameter and leveraging layered defenses.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-01-07T07:45:07.362Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68ae04daad5a09ad005ad9f4
Added to database: 8/26/2025, 7:02:50 PM
Last enriched: 8/26/2025, 7:18:03 PM
Last updated: 9/2/2025, 12:34:20 AM
Views: 10
Related Threats
CVE-2025-1740: CWE-307 Improper Restriction of Excessive Authentication Attempts in Akinsoft MyRezzta
CriticalCVE-2025-2415: CWE-307 Improper Restriction of Excessive Authentication Attempts in Akinsoft MyRezzta
HighCVE-2025-9219: CWE-862 Missing Authorization in saadiqbal Post SMTP – WP SMTP Plugin with Email Logs and Mobile App for Failure Notifications – Gmail SMTP, Office 365, Brevo, Mailgun, Amazon SES and more
MediumCVE-2025-9817: CWE-476: NULL Pointer Dereference in Wireshark Foundation Wireshark
HighCVE-2025-8663: CWE-532 Insertion of Sensitive Information into Log File in upKeeper Solutions upKeeper Manager
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.