CVE-2025-12302: Cross Site Scripting in code-projects Simple Food Ordering System
A vulnerability was detected in code-projects Simple Food Ordering System 1.0. The affected element is an unknown function of the file /editproduct.php. Performing manipulation of the argument pname/category/price results in cross site scripting. The attack may be initiated remotely. The exploit is now public and may be used.
AI Analysis
Technical Summary
CVE-2025-12302 is a Cross Site Scripting (XSS) vulnerability identified in the Simple Food Ordering System version 1.0 developed by code-projects. The vulnerability exists in the /editproduct.php file, where the parameters pname, category, and price are not properly sanitized or validated before being reflected in the web page output. This flaw allows an attacker to inject malicious JavaScript code remotely without requiring authentication. The vulnerability is triggered when a victim interacts with a crafted URL or input containing the malicious payload, leading to script execution in the victim's browser context. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:P), and limited impact on confidentiality and integrity (VI:L, VC:N). The vulnerability does not affect availability and does not require scope or authorization changes. Although no active exploits are reported in the wild, the public availability of exploit code increases the risk of opportunistic attacks. The primary risks include session hijacking, theft of cookies or credentials, defacement, or redirecting users to malicious websites. The affected product is typically used by small to medium-sized food service businesses to manage online orders, making the vulnerability relevant to organizations relying on this software for customer-facing operations. The lack of official patches or updates at the time of publication necessitates immediate mitigation through input validation and output encoding. Additionally, deploying Content Security Policy (CSP) headers can help mitigate the impact of injected scripts. Monitoring web traffic for suspicious requests and educating users about phishing attempts can further reduce exploitation likelihood.
Potential Impact
For European organizations, the impact of CVE-2025-12302 can be significant, especially for small and medium enterprises (SMEs) in the food service sector that utilize the Simple Food Ordering System. Exploitation of this XSS vulnerability can lead to unauthorized script execution in users' browsers, resulting in session hijacking, credential theft, or redirection to malicious sites. This compromises customer trust and can lead to reputational damage and potential regulatory penalties under GDPR if personal data is exposed. The integrity of order data and user interactions may be undermined, affecting business operations. While availability is not directly impacted, the indirect consequences of compromised systems could disrupt service continuity. The medium severity suggests a moderate risk, but the public availability of exploit code increases the urgency for European organizations to address this vulnerability promptly. Organizations with online ordering platforms are particularly at risk of targeted phishing or social engineering attacks leveraging this flaw.
Mitigation Recommendations
1. Implement strict server-side input validation and sanitization for all user-supplied parameters, especially pname, category, and price, to ensure that no executable scripts can be injected. 2. Apply proper output encoding (e.g., HTML entity encoding) before rendering user inputs in web pages to prevent script execution. 3. Deploy Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of potential XSS attacks. 4. Monitor web server logs and web application firewall (WAF) alerts for suspicious requests targeting /editproduct.php or containing script payloads. 5. Educate staff and users about the risks of clicking on suspicious links and encourage reporting of unusual website behavior. 6. If available, apply official patches or updates from the vendor promptly; if not, consider upgrading to a more secure ordering system. 7. Conduct regular security assessments and penetration testing focusing on input validation and client-side script execution. 8. Isolate the ordering system within a segmented network zone to limit lateral movement if compromised.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Netherlands, Belgium
CVE-2025-12302: Cross Site Scripting in code-projects Simple Food Ordering System
Description
A vulnerability was detected in code-projects Simple Food Ordering System 1.0. The affected element is an unknown function of the file /editproduct.php. Performing manipulation of the argument pname/category/price results in cross site scripting. The attack may be initiated remotely. The exploit is now public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-12302 is a Cross Site Scripting (XSS) vulnerability identified in the Simple Food Ordering System version 1.0 developed by code-projects. The vulnerability exists in the /editproduct.php file, where the parameters pname, category, and price are not properly sanitized or validated before being reflected in the web page output. This flaw allows an attacker to inject malicious JavaScript code remotely without requiring authentication. The vulnerability is triggered when a victim interacts with a crafted URL or input containing the malicious payload, leading to script execution in the victim's browser context. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:P), and limited impact on confidentiality and integrity (VI:L, VC:N). The vulnerability does not affect availability and does not require scope or authorization changes. Although no active exploits are reported in the wild, the public availability of exploit code increases the risk of opportunistic attacks. The primary risks include session hijacking, theft of cookies or credentials, defacement, or redirecting users to malicious websites. The affected product is typically used by small to medium-sized food service businesses to manage online orders, making the vulnerability relevant to organizations relying on this software for customer-facing operations. The lack of official patches or updates at the time of publication necessitates immediate mitigation through input validation and output encoding. Additionally, deploying Content Security Policy (CSP) headers can help mitigate the impact of injected scripts. Monitoring web traffic for suspicious requests and educating users about phishing attempts can further reduce exploitation likelihood.
Potential Impact
For European organizations, the impact of CVE-2025-12302 can be significant, especially for small and medium enterprises (SMEs) in the food service sector that utilize the Simple Food Ordering System. Exploitation of this XSS vulnerability can lead to unauthorized script execution in users' browsers, resulting in session hijacking, credential theft, or redirection to malicious sites. This compromises customer trust and can lead to reputational damage and potential regulatory penalties under GDPR if personal data is exposed. The integrity of order data and user interactions may be undermined, affecting business operations. While availability is not directly impacted, the indirect consequences of compromised systems could disrupt service continuity. The medium severity suggests a moderate risk, but the public availability of exploit code increases the urgency for European organizations to address this vulnerability promptly. Organizations with online ordering platforms are particularly at risk of targeted phishing or social engineering attacks leveraging this flaw.
Mitigation Recommendations
1. Implement strict server-side input validation and sanitization for all user-supplied parameters, especially pname, category, and price, to ensure that no executable scripts can be injected. 2. Apply proper output encoding (e.g., HTML entity encoding) before rendering user inputs in web pages to prevent script execution. 3. Deploy Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of potential XSS attacks. 4. Monitor web server logs and web application firewall (WAF) alerts for suspicious requests targeting /editproduct.php or containing script payloads. 5. Educate staff and users about the risks of clicking on suspicious links and encourage reporting of unusual website behavior. 6. If available, apply official patches or updates from the vendor promptly; if not, consider upgrading to a more secure ordering system. 7. Conduct regular security assessments and penetration testing focusing on input validation and client-side script execution. 8. Isolate the ordering system within a segmented network zone to limit lateral movement if compromised.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-10-26T16:59:38.183Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68ffb875ba6dffc5e206e0cf
Added to database: 10/27/2025, 6:22:45 PM
Last enriched: 10/27/2025, 6:38:20 PM
Last updated: 10/30/2025, 9:47:59 AM
Views: 21
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-54470: CWE-295: Improper Certificate Validation in SUSE neuvector
HighCVE-2025-62503: CWE-250: Execution with Unnecessary Privileges in Apache Software Foundation Apache Airflow
HighCVE-2025-62402: CWE-250: Execution with Unnecessary Privileges in Apache Software Foundation Apache Airflow
HighCVE-2025-11906: CWE-732 Incorrect Permission Assignment for Critical Resource in Progress Software Flowmon
MediumCVE-2025-11881: CWE-862 Missing Authorization in scottopolis AppPresser – Mobile App Framework
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.