Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12302: Cross Site Scripting in code-projects Simple Food Ordering System

0
Medium
VulnerabilityCVE-2025-12302cvecve-2025-12302
Published: Mon Oct 27 2025 (10/27/2025, 18:02:06 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Simple Food Ordering System

Description

A vulnerability was detected in code-projects Simple Food Ordering System 1.0. The affected element is an unknown function of the file /editproduct.php. Performing manipulation of the argument pname/category/price results in cross site scripting. The attack may be initiated remotely. The exploit is now public and may be used.

AI-Powered Analysis

AILast updated: 10/27/2025, 18:38:20 UTC

Technical Analysis

CVE-2025-12302 is a Cross Site Scripting (XSS) vulnerability identified in the Simple Food Ordering System version 1.0 developed by code-projects. The vulnerability exists in the /editproduct.php file, where the parameters pname, category, and price are not properly sanitized or validated before being reflected in the web page output. This flaw allows an attacker to inject malicious JavaScript code remotely without requiring authentication. The vulnerability is triggered when a victim interacts with a crafted URL or input containing the malicious payload, leading to script execution in the victim's browser context. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:P), and limited impact on confidentiality and integrity (VI:L, VC:N). The vulnerability does not affect availability and does not require scope or authorization changes. Although no active exploits are reported in the wild, the public availability of exploit code increases the risk of opportunistic attacks. The primary risks include session hijacking, theft of cookies or credentials, defacement, or redirecting users to malicious websites. The affected product is typically used by small to medium-sized food service businesses to manage online orders, making the vulnerability relevant to organizations relying on this software for customer-facing operations. The lack of official patches or updates at the time of publication necessitates immediate mitigation through input validation and output encoding. Additionally, deploying Content Security Policy (CSP) headers can help mitigate the impact of injected scripts. Monitoring web traffic for suspicious requests and educating users about phishing attempts can further reduce exploitation likelihood.

Potential Impact

For European organizations, the impact of CVE-2025-12302 can be significant, especially for small and medium enterprises (SMEs) in the food service sector that utilize the Simple Food Ordering System. Exploitation of this XSS vulnerability can lead to unauthorized script execution in users' browsers, resulting in session hijacking, credential theft, or redirection to malicious sites. This compromises customer trust and can lead to reputational damage and potential regulatory penalties under GDPR if personal data is exposed. The integrity of order data and user interactions may be undermined, affecting business operations. While availability is not directly impacted, the indirect consequences of compromised systems could disrupt service continuity. The medium severity suggests a moderate risk, but the public availability of exploit code increases the urgency for European organizations to address this vulnerability promptly. Organizations with online ordering platforms are particularly at risk of targeted phishing or social engineering attacks leveraging this flaw.

Mitigation Recommendations

1. Implement strict server-side input validation and sanitization for all user-supplied parameters, especially pname, category, and price, to ensure that no executable scripts can be injected. 2. Apply proper output encoding (e.g., HTML entity encoding) before rendering user inputs in web pages to prevent script execution. 3. Deploy Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of potential XSS attacks. 4. Monitor web server logs and web application firewall (WAF) alerts for suspicious requests targeting /editproduct.php or containing script payloads. 5. Educate staff and users about the risks of clicking on suspicious links and encourage reporting of unusual website behavior. 6. If available, apply official patches or updates from the vendor promptly; if not, consider upgrading to a more secure ordering system. 7. Conduct regular security assessments and penetration testing focusing on input validation and client-side script execution. 8. Isolate the ordering system within a segmented network zone to limit lateral movement if compromised.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-26T16:59:38.183Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ffb875ba6dffc5e206e0cf

Added to database: 10/27/2025, 6:22:45 PM

Last enriched: 10/27/2025, 6:38:20 PM

Last updated: 10/30/2025, 9:47:59 AM

Views: 21

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats