Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13450: Cross Site Scripting in SourceCodester Online Shop Project

0
Medium
VulnerabilityCVE-2025-13450cvecve-2025-13450
Published: Thu Nov 20 2025 (11/20/2025, 03:02:06 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: Online Shop Project

Description

A vulnerability was determined in SourceCodester Online Shop Project 1.0. Impacted is an unknown function of the file /shop/register.php. This manipulation of the argument f_name causes cross site scripting. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized.

AI-Powered Analysis

AILast updated: 11/27/2025, 04:46:55 UTC

Technical Analysis

CVE-2025-13450 is a Cross Site Scripting (XSS) vulnerability identified in the SourceCodester Online Shop Project version 1.0. The vulnerability resides in the /shop/register.php file, specifically in the handling of the f_name parameter. Improper sanitization or encoding of this input allows an attacker to inject malicious JavaScript code, which is then executed in the context of the victim's browser. This type of vulnerability is classified as reflected XSS, as it involves manipulation of input parameters that are reflected back in the web page response. The attack can be initiated remotely without requiring authentication, although it requires user interaction (e.g., clicking a crafted link). The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), user interaction required (UI:P), and limited impact on confidentiality and integrity (VC:N, VI:L), with no impact on availability. The vulnerability was publicly disclosed shortly after being reserved, but no active exploits have been reported in the wild. The lack of patches or official fixes at the time of disclosure increases the urgency for organizations to implement mitigations. XSS vulnerabilities can be leveraged for session hijacking, phishing, or delivering malware, potentially damaging user trust and leading to data breaches. The SourceCodester Online Shop Project is an open-source e-commerce solution, often used by small to medium-sized businesses for online retail operations. The presence of this vulnerability in the registration page is particularly concerning as it targets a common user entry point, increasing the likelihood of exploitation.

Potential Impact

For European organizations using the SourceCodester Online Shop Project 1.0, this vulnerability poses a moderate risk. Exploitation could allow attackers to execute arbitrary scripts in users' browsers, leading to session hijacking, theft of sensitive information such as credentials or personal data, and phishing attacks that could compromise customer trust and brand reputation. While the impact on system availability is negligible, the integrity and confidentiality of user data could be compromised. Given the e-commerce context, this could result in financial losses and regulatory compliance issues under GDPR due to exposure of personal data. The requirement for user interaction somewhat limits the scope, but the remote attack vector and lack of authentication make it accessible to a wide range of attackers. Organizations relying on this software without timely patching or mitigation are at risk of targeted attacks, especially during high-traffic periods such as sales or holidays. Additionally, the public disclosure of the vulnerability increases the likelihood of exploitation attempts by opportunistic attackers.

Mitigation Recommendations

To mitigate CVE-2025-13450, organizations should first check for any official patches or updates from SourceCodester and apply them promptly. In the absence of patches, developers should implement strict input validation and output encoding on the f_name parameter to neutralize malicious scripts. Utilizing frameworks or libraries that automatically handle XSS protection is recommended. Deploying a robust Content Security Policy (CSP) can help restrict the execution of unauthorized scripts. Web Application Firewalls (WAFs) should be configured to detect and block suspicious payloads targeting the vulnerable parameter. Regular security testing, including automated scanning and manual code reviews focused on input handling, should be conducted. Educating users about the risks of clicking unknown links can reduce successful exploitation via social engineering. Monitoring web traffic for unusual patterns and setting up alerts for potential XSS attempts can aid in early detection. Finally, organizations should consider migrating to more secure or actively maintained e-commerce platforms if feasible.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-19T19:20:41.933Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691e890f1af65083e684c08c

Added to database: 11/20/2025, 3:20:47 AM

Last enriched: 11/27/2025, 4:46:55 AM

Last updated: 1/7/2026, 8:48:33 AM

Views: 71

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats