Skip to main content

CVE-2025-10837: Cross Site Scripting in code-projects Simple Food Ordering System

Medium
VulnerabilityCVE-2025-10837cvecve-2025-10837
Published: Tue Sep 23 2025 (09/23/2025, 04:02:07 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Simple Food Ordering System

Description

A security vulnerability has been detected in code-projects Simple Food Ordering System 1.0. Affected by this vulnerability is an unknown functionality of the file /ordersimple/order.php. The manipulation of the argument ID leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used.

AI-Powered Analysis

AILast updated: 09/23/2025, 14:02:14 UTC

Technical Analysis

CVE-2025-10837 is a cross-site scripting (XSS) vulnerability identified in version 1.0 of the Simple Food Ordering System developed by code-projects. The vulnerability resides in the /ordersimple/order.php file, specifically involving the manipulation of the 'ID' parameter. An attacker can exploit this flaw by injecting malicious scripts into the 'ID' argument, which the application then processes without adequate sanitization or encoding. This leads to the execution of arbitrary JavaScript code in the context of the victim's browser. The vulnerability is remotely exploitable without requiring authentication, although it requires some user interaction (such as clicking a crafted link or visiting a malicious page). The CVSS 4.0 base score is 5.1, indicating a medium severity level. The vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), user interaction required (UI:P), and limited impact on confidentiality and integrity (VC:N, VI:L), with no impact on availability (VA:N). The vulnerability has been publicly disclosed, but there are no known exploits actively used in the wild at this time. The lack of available patches or mitigations from the vendor increases the risk for users of this software. XSS vulnerabilities can be leveraged for session hijacking, phishing, or delivering malware payloads, potentially compromising user data and trust in the affected web application.

Potential Impact

For European organizations using the Simple Food Ordering System 1.0, this vulnerability poses a risk primarily to the confidentiality and integrity of user sessions and data. Attackers could exploit the XSS flaw to steal session cookies, perform actions on behalf of legitimate users, or redirect users to malicious sites. This could lead to data breaches involving customer information, financial fraud, or reputational damage. Since the affected software is a food ordering system, organizations in the hospitality and food service sectors are particularly at risk. The impact is heightened in Europe due to strict data protection regulations such as GDPR, where unauthorized disclosure of personal data can result in significant fines and legal consequences. Additionally, the medium severity rating suggests that while the vulnerability is not critical, it is exploitable remotely and can be leveraged as part of a broader attack chain. The absence of known exploits in the wild currently reduces immediate risk, but the public disclosure means attackers could develop exploits rapidly. Organizations relying on this system should consider the potential for targeted phishing campaigns or web-based attacks exploiting this vulnerability.

Mitigation Recommendations

Given the absence of official patches, European organizations should implement immediate compensating controls. First, input validation and output encoding should be enforced on the 'ID' parameter in /ordersimple/order.php to neutralize malicious scripts. If source code access is available, developers should sanitize inputs using established libraries or frameworks that prevent XSS. Web Application Firewalls (WAFs) can be configured to detect and block suspicious payloads targeting this parameter. Organizations should also conduct security awareness training to educate users about the risks of clicking untrusted links. Monitoring web server logs for unusual requests to the vulnerable endpoint can help detect exploitation attempts. Where feasible, consider isolating or replacing the vulnerable system with a more secure alternative. Regular vulnerability scanning and penetration testing should be employed to verify the effectiveness of mitigations. Finally, organizations should stay alert for vendor updates or community patches addressing this vulnerability and apply them promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-21T19:43:35.728Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68d2a78d3a159a196863e821

Added to database: 9/23/2025, 1:58:37 PM

Last enriched: 9/23/2025, 2:02:14 PM

Last updated: 9/25/2025, 12:08:24 AM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats