Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12334: Cross Site Scripting in code-projects E-Commerce Website

0
Medium
VulnerabilityCVE-2025-12334cvecve-2025-12334
Published: Mon Oct 27 2025 (10/27/2025, 22:32:11 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: E-Commerce Website

Description

A vulnerability was found in code-projects E-Commerce Website 1.0. Affected is an unknown function of the file /pages/product_add.php. The manipulation of the argument prod_name/prod_desc/prod_cost results in cross site scripting. It is possible to launch the attack remotely. The exploit has been made public and could be used.

AI-Powered Analysis

AILast updated: 11/04/2025, 03:15:21 UTC

Technical Analysis

CVE-2025-12334 is a Cross Site Scripting (XSS) vulnerability identified in the code-projects E-Commerce Website version 1.0, specifically within the /pages/product_add.php script. The vulnerability arises due to improper sanitization of user-supplied input parameters: prod_name, prod_desc, and prod_cost. These parameters are used in a manner that allows injection and execution of arbitrary JavaScript code in the context of the victim's browser. The attack vector is remote and does not require any authentication, making it accessible to unauthenticated attackers. The vulnerability requires user interaction, typically the victim clicking on a malicious link or visiting a compromised page that triggers the script execution. The impact of this vulnerability includes potential theft of session cookies, enabling account takeover, defacement of web pages, or redirecting users to malicious sites for phishing or malware delivery. Although no active exploitation has been reported, the public availability of exploit code increases the likelihood of future attacks. The CVSS 4.0 base score of 5.3 reflects a medium severity, with network attack vector, low attack complexity, no privileges required, and user interaction needed. The vulnerability affects only version 1.0 of the product, and no official patches have been published yet, necessitating immediate mitigation steps by affected organizations.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to e-commerce platforms running the affected code-projects E-Commerce Website 1.0. Successful exploitation can compromise customer data confidentiality through session hijacking or credential theft, potentially damaging brand reputation and customer trust. Integrity of displayed product information can be manipulated, leading to misinformation or fraudulent transactions. Although availability impact is minimal, the indirect consequences such as regulatory fines under GDPR for data breaches and loss of consumer confidence can be significant. Organizations in Europe with online retail operations are particularly vulnerable, especially those lacking robust input validation or web application firewalls. The public disclosure of exploit code increases the urgency to address this vulnerability to prevent phishing campaigns or broader web-based attacks targeting European consumers.

Mitigation Recommendations

Since no official patch is currently available, European organizations should implement immediate compensating controls. These include applying strict input validation and output encoding on all user-supplied data, especially prod_name, prod_desc, and prod_cost parameters, to neutralize malicious scripts. Deploying a Web Application Firewall (WAF) with rules to detect and block XSS payloads targeting these parameters can reduce exposure. Conduct thorough code reviews and security testing to identify and remediate similar injection points. Educate users to be cautious of suspicious links and emails to mitigate social engineering risks. Monitor web traffic and logs for unusual activity indicative of attempted XSS exploitation. Plan for prompt patching once a vendor fix is released. Additionally, implement Content Security Policy (CSP) headers to restrict script execution origins, limiting the impact of potential XSS attacks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-27T12:38:32.744Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68fff444ba6dffc5e21326a8

Added to database: 10/27/2025, 10:37:56 PM

Last enriched: 11/4/2025, 3:15:21 AM

Last updated: 12/11/2025, 2:50:59 PM

Views: 143

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats