Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12299: Cross Site Scripting in code-projects Simple Food Ordering System

0
Medium
VulnerabilityCVE-2025-12299cvecve-2025-12299
Published: Mon Oct 27 2025 (10/27/2025, 17:02:09 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Simple Food Ordering System

Description

CVE-2025-12299 is a medium severity cross-site scripting (XSS) vulnerability found in version 1. 0 of the code-projects Simple Food Ordering System. The flaw exists in the /addproduct. php file, where manipulation of the pname, category, or price parameters allows remote attackers to inject malicious scripts. Exploitation does not require authentication but does require user interaction, such as a victim visiting a crafted URL. Although no known exploits are currently observed in the wild, the exploit code has been publicly released, increasing the risk of attacks. The vulnerability can lead to theft of user credentials, session hijacking, or defacement of web content. European organizations using this software, especially in the hospitality or food service sectors, may face targeted attacks. Mitigation involves sanitizing and validating all user inputs on the affected parameters and applying patches once available. Countries with higher adoption of small to medium hospitality businesses using this software, such as Germany, France, Italy, and Spain, are more likely to be impacted.

AI-Powered Analysis

AILast updated: 11/03/2025, 17:51:47 UTC

Technical Analysis

CVE-2025-12299 is a cross-site scripting vulnerability identified in the Simple Food Ordering System version 1.0 developed by code-projects. The vulnerability resides in the /addproduct.php script, where the parameters pname, category, and price are not properly sanitized or validated, allowing attackers to inject malicious JavaScript code. This flaw enables remote attackers to craft URLs or requests that, when visited or processed by a victim's browser, execute arbitrary scripts in the context of the vulnerable web application. The vulnerability requires no authentication and can be exploited remotely, but user interaction is necessary for the attack to succeed (e.g., clicking a malicious link). The CVSS 4.0 vector indicates low attack complexity and no privileges required, but user interaction is needed. The impact primarily affects confidentiality and integrity by enabling session hijacking, credential theft, or manipulation of displayed content. Although no patches or fixes have been officially released yet, the public availability of exploit code increases the urgency for mitigation. The vulnerability is particularly relevant for organizations running this software in production environments, especially those handling customer data or payment information. Proper input validation, output encoding, and use of security headers are critical to mitigating this threat.

Potential Impact

For European organizations, especially those in the hospitality and food service sectors using the Simple Food Ordering System, this vulnerability could lead to significant security incidents. Successful exploitation could result in theft of customer credentials, unauthorized access to user sessions, and potential defacement or manipulation of the ordering interface, undermining customer trust and business reputation. Additionally, attackers could use the vulnerability as a foothold for further attacks such as phishing or spreading malware. Given the public availability of exploit code, the risk of targeted attacks is elevated. The impact on data privacy is particularly concerning under the GDPR framework, as compromised customer data could lead to regulatory penalties and legal liabilities. Organizations relying on this software without timely mitigation may face service disruptions and financial losses due to fraud or remediation costs.

Mitigation Recommendations

To mitigate CVE-2025-12299, organizations should immediately implement strict input validation and output encoding on the pname, category, and price parameters within /addproduct.php. Employing a whitelist approach for acceptable input values can significantly reduce injection risks. Utilizing security libraries or frameworks that automatically handle XSS protections is recommended. Web Application Firewalls (WAFs) can be configured to detect and block suspicious input patterns targeting these parameters. Monitoring web server logs for unusual requests to /addproduct.php can help identify attempted exploits. Since no official patch is currently available, organizations should consider isolating or restricting access to the affected application until a fix is released. Educating staff and users about the risks of clicking unknown links can reduce successful exploitation. Finally, applying Content Security Policy (CSP) headers can limit the impact of injected scripts by restricting script execution sources.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-26T16:59:30.634Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ffa6e0ba6dffc5e2036881

Added to database: 10/27/2025, 5:07:44 PM

Last enriched: 11/3/2025, 5:51:47 PM

Last updated: 12/14/2025, 2:13:06 PM

Views: 141

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats