CVE-2025-10837: Cross Site Scripting in code-projects Simple Food Ordering System
A security vulnerability has been detected in code-projects Simple Food Ordering System 1.0. Affected by this vulnerability is an unknown functionality of the file /ordersimple/order.php. The manipulation of the argument ID leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used.
AI Analysis
Technical Summary
CVE-2025-10837 is a cross-site scripting (XSS) vulnerability identified in version 1.0 of the Simple Food Ordering System developed by code-projects. The vulnerability resides in the /ordersimple/order.php file, specifically involving the manipulation of the 'ID' parameter. An attacker can exploit this flaw by injecting malicious scripts into the 'ID' argument, which the application then processes without adequate sanitization or encoding. This leads to the execution of arbitrary JavaScript code in the context of the victim's browser. The vulnerability is remotely exploitable without requiring authentication, although it requires some user interaction (such as clicking a crafted link or visiting a malicious page). The CVSS 4.0 base score is 5.1, indicating a medium severity level. The vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), user interaction required (UI:P), and limited impact on confidentiality and integrity (VC:N, VI:L), with no impact on availability (VA:N). The vulnerability has been publicly disclosed, but there are no known exploits actively used in the wild at this time. The lack of available patches or mitigations from the vendor increases the risk for users of this software. XSS vulnerabilities can be leveraged for session hijacking, phishing, or delivering malware payloads, potentially compromising user data and trust in the affected web application.
Potential Impact
For European organizations using the Simple Food Ordering System 1.0, this vulnerability poses a risk primarily to the confidentiality and integrity of user sessions and data. Attackers could exploit the XSS flaw to steal session cookies, perform actions on behalf of legitimate users, or redirect users to malicious sites. This could lead to data breaches involving customer information, financial fraud, or reputational damage. Since the affected software is a food ordering system, organizations in the hospitality and food service sectors are particularly at risk. The impact is heightened in Europe due to strict data protection regulations such as GDPR, where unauthorized disclosure of personal data can result in significant fines and legal consequences. Additionally, the medium severity rating suggests that while the vulnerability is not critical, it is exploitable remotely and can be leveraged as part of a broader attack chain. The absence of known exploits in the wild currently reduces immediate risk, but the public disclosure means attackers could develop exploits rapidly. Organizations relying on this system should consider the potential for targeted phishing campaigns or web-based attacks exploiting this vulnerability.
Mitigation Recommendations
Given the absence of official patches, European organizations should implement immediate compensating controls. First, input validation and output encoding should be enforced on the 'ID' parameter in /ordersimple/order.php to neutralize malicious scripts. If source code access is available, developers should sanitize inputs using established libraries or frameworks that prevent XSS. Web Application Firewalls (WAFs) can be configured to detect and block suspicious payloads targeting this parameter. Organizations should also conduct security awareness training to educate users about the risks of clicking untrusted links. Monitoring web server logs for unusual requests to the vulnerable endpoint can help detect exploitation attempts. Where feasible, consider isolating or replacing the vulnerable system with a more secure alternative. Regular vulnerability scanning and penetration testing should be employed to verify the effectiveness of mitigations. Finally, organizations should stay alert for vendor updates or community patches addressing this vulnerability and apply them promptly once available.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden
CVE-2025-10837: Cross Site Scripting in code-projects Simple Food Ordering System
Description
A security vulnerability has been detected in code-projects Simple Food Ordering System 1.0. Affected by this vulnerability is an unknown functionality of the file /ordersimple/order.php. The manipulation of the argument ID leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-10837 is a cross-site scripting (XSS) vulnerability identified in version 1.0 of the Simple Food Ordering System developed by code-projects. The vulnerability resides in the /ordersimple/order.php file, specifically involving the manipulation of the 'ID' parameter. An attacker can exploit this flaw by injecting malicious scripts into the 'ID' argument, which the application then processes without adequate sanitization or encoding. This leads to the execution of arbitrary JavaScript code in the context of the victim's browser. The vulnerability is remotely exploitable without requiring authentication, although it requires some user interaction (such as clicking a crafted link or visiting a malicious page). The CVSS 4.0 base score is 5.1, indicating a medium severity level. The vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), user interaction required (UI:P), and limited impact on confidentiality and integrity (VC:N, VI:L), with no impact on availability (VA:N). The vulnerability has been publicly disclosed, but there are no known exploits actively used in the wild at this time. The lack of available patches or mitigations from the vendor increases the risk for users of this software. XSS vulnerabilities can be leveraged for session hijacking, phishing, or delivering malware payloads, potentially compromising user data and trust in the affected web application.
Potential Impact
For European organizations using the Simple Food Ordering System 1.0, this vulnerability poses a risk primarily to the confidentiality and integrity of user sessions and data. Attackers could exploit the XSS flaw to steal session cookies, perform actions on behalf of legitimate users, or redirect users to malicious sites. This could lead to data breaches involving customer information, financial fraud, or reputational damage. Since the affected software is a food ordering system, organizations in the hospitality and food service sectors are particularly at risk. The impact is heightened in Europe due to strict data protection regulations such as GDPR, where unauthorized disclosure of personal data can result in significant fines and legal consequences. Additionally, the medium severity rating suggests that while the vulnerability is not critical, it is exploitable remotely and can be leveraged as part of a broader attack chain. The absence of known exploits in the wild currently reduces immediate risk, but the public disclosure means attackers could develop exploits rapidly. Organizations relying on this system should consider the potential for targeted phishing campaigns or web-based attacks exploiting this vulnerability.
Mitigation Recommendations
Given the absence of official patches, European organizations should implement immediate compensating controls. First, input validation and output encoding should be enforced on the 'ID' parameter in /ordersimple/order.php to neutralize malicious scripts. If source code access is available, developers should sanitize inputs using established libraries or frameworks that prevent XSS. Web Application Firewalls (WAFs) can be configured to detect and block suspicious payloads targeting this parameter. Organizations should also conduct security awareness training to educate users about the risks of clicking untrusted links. Monitoring web server logs for unusual requests to the vulnerable endpoint can help detect exploitation attempts. Where feasible, consider isolating or replacing the vulnerable system with a more secure alternative. Regular vulnerability scanning and penetration testing should be employed to verify the effectiveness of mitigations. Finally, organizations should stay alert for vendor updates or community patches addressing this vulnerability and apply them promptly once available.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-21T19:43:35.728Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68d2a78d3a159a196863e821
Added to database: 9/23/2025, 1:58:37 PM
Last enriched: 9/23/2025, 2:02:14 PM
Last updated: 11/8/2025, 6:51:04 PM
Views: 67
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12837: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in smub aThemes Addons for Elementor
MediumCVE-2025-12643: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in saphali Saphali LiqPay for donate
MediumCVE-2025-12399: CWE-434 Unrestricted Upload of File with Dangerous Type in alexreservations Alex Reservations: Smart Restaurant Booking
HighCVE-2025-12092: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in gregross CYAN Backup
MediumCVE-2025-11980: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in kybernetikservices Quick Featured Images
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.