Skip to main content

CVE-2025-0295: Cross Site Scripting in code-projects Online Book Shop

Medium
VulnerabilityCVE-2025-0295cvecve-2025-0295
Published: Tue Jan 07 2025 (01/07/2025, 14:00:13 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Online Book Shop

Description

A vulnerability was found in code-projects Online Book Shop 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /booklist.php?subcatid=1. The manipulation of the argument subcatnm leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 08/26/2025, 19:18:03 UTC

Technical Analysis

CVE-2025-0295 is a cross-site scripting (XSS) vulnerability identified in version 1.0 of the code-projects Online Book Shop application. The vulnerability resides in the /booklist.php script, specifically in the handling of the 'subcatnm' parameter. Improper input validation or output encoding of this parameter allows an attacker to inject malicious scripts that execute in the context of the victim's browser. This type of vulnerability can be exploited remotely without requiring user interaction or authentication, as indicated by the CVSS vector. The CVSS 4.0 base score is 5.3, categorizing it as a medium severity issue. The vulnerability impacts the confidentiality and integrity of user data by enabling attackers to steal session cookies, perform actions on behalf of users, or redirect users to malicious sites. The vulnerability does not affect system availability directly and does not require privileges or user interaction, making it easier to exploit. Although no known exploits are currently reported in the wild, the public disclosure of the vulnerability increases the risk of exploitation. The lack of a patch or mitigation guidance from the vendor further elevates the urgency for affected organizations to implement protective measures.

Potential Impact

For European organizations using the code-projects Online Book Shop version 1.0, this XSS vulnerability poses a risk primarily to the confidentiality and integrity of user data. Attackers could hijack user sessions, steal sensitive information such as login credentials or personal data, and manipulate the user experience to conduct phishing or fraud. This is particularly concerning for e-commerce platforms where customer trust and data protection are paramount. The vulnerability could also be leveraged as a foothold for further attacks within the organization's network if administrative users are targeted. Given the remote exploitability without authentication, attackers can target any user visiting the vulnerable web page, increasing the attack surface. The impact is heightened in the context of GDPR compliance, as data breaches involving personal data could lead to regulatory penalties and reputational damage. However, since the vulnerability does not affect availability or require user interaction, the operational disruption risk is limited but not negligible.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should prioritize the following actions: 1) Immediate input validation and output encoding: Implement strict server-side validation of the 'subcatnm' parameter to reject or sanitize malicious input. Use context-appropriate output encoding (e.g., HTML entity encoding) before rendering user-supplied data in the browser. 2) Web Application Firewall (WAF): Deploy or update WAF rules to detect and block malicious payloads targeting the 'subcatnm' parameter. 3) Content Security Policy (CSP): Implement a robust CSP header to restrict the execution of unauthorized scripts and reduce the impact of XSS attacks. 4) User awareness: Educate users about the risks of clicking suspicious links and encourage the use of updated browsers with built-in XSS protections. 5) Vendor engagement: Contact the vendor for patches or updates and monitor for official fixes. If no patch is available, consider upgrading to a newer, secure version or migrating to alternative platforms. 6) Regular security testing: Conduct periodic vulnerability assessments and penetration testing focusing on input validation and XSS vectors. These measures go beyond generic advice by focusing on the specific vulnerable parameter and leveraging layered defenses.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-01-07T07:45:07.362Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ae04daad5a09ad005ad9f4

Added to database: 8/26/2025, 7:02:50 PM

Last enriched: 8/26/2025, 7:18:03 PM

Last updated: 9/2/2025, 12:34:20 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats