CVE-2025-7840: Cross Site Scripting in Campcodes Online Movie Theater Seat Reservation System
A vulnerability was found in Campcodes Online Movie Theater Seat Reservation System 1.0. It has been classified as problematic. This affects an unknown part of the file /index.php?page=reserve of the component Reserve Your Seat Page. The manipulation of the argument Firstname/Lastname leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-7840 is a cross-site scripting (XSS) vulnerability identified in version 1.0 of the Campcodes Online Movie Theater Seat Reservation System. The vulnerability resides in the 'Reserve Your Seat' page, specifically within the /index.php?page=reserve endpoint. The issue arises from improper sanitization or validation of user-supplied input in the 'Firstname' and 'Lastname' parameters, allowing an attacker to inject malicious scripts. This vulnerability can be exploited remotely without requiring authentication, although user interaction is necessary to trigger the malicious payload, such as when a victim views a crafted page or input. The CVSS 4.0 score is 5.1, indicating a medium severity level. The attack vector is network-based with low attack complexity and no privileges required, but user interaction is needed to execute the attack. The impact primarily affects confidentiality and integrity at a low level, with no direct impact on availability or system control. Since the exploit has been publicly disclosed, there is an increased risk of exploitation, although no known active exploits have been reported in the wild. The vulnerability could be leveraged to steal session cookies, perform phishing, or conduct other client-side attacks against users of the system, potentially leading to account compromise or unauthorized actions within the reservation system.
Potential Impact
For European organizations operating or using the Campcodes Online Movie Theater Seat Reservation System, this vulnerability poses a risk to the confidentiality and integrity of user data. Attackers could exploit the XSS flaw to hijack user sessions, redirect users to malicious sites, or perform actions on behalf of users without their consent. This could lead to reputational damage, loss of customer trust, and potential regulatory scrutiny under GDPR if personal data is compromised. Although the direct impact on system availability is minimal, the indirect effects such as phishing or social engineering attacks could have broader security implications. Organizations relying on this system for customer interactions may face increased support costs and operational disruptions. The risk is heightened by the public disclosure of the exploit, which lowers the barrier for attackers to craft and deploy attacks targeting vulnerable installations.
Mitigation Recommendations
To mitigate this vulnerability, organizations should implement strict input validation and output encoding on all user-supplied data, particularly the 'Firstname' and 'Lastname' fields on the reservation page. Employing Content Security Policy (CSP) headers can help reduce the impact of XSS by restricting the execution of unauthorized scripts. Web Application Firewalls (WAFs) configured to detect and block XSS payloads can provide an additional layer of defense. Since no official patch is currently available, organizations should consider temporary workarounds such as disabling or restricting the vulnerable reservation functionality or sanitizing inputs at the web server or proxy level. Regular security assessments and penetration testing should be conducted to identify and remediate similar issues. User education on recognizing phishing and suspicious links is also recommended to reduce the risk of successful exploitation. Monitoring logs for unusual activity related to the reservation system can help detect attempted attacks early.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-7840: Cross Site Scripting in Campcodes Online Movie Theater Seat Reservation System
Description
A vulnerability was found in Campcodes Online Movie Theater Seat Reservation System 1.0. It has been classified as problematic. This affects an unknown part of the file /index.php?page=reserve of the component Reserve Your Seat Page. The manipulation of the argument Firstname/Lastname leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-7840 is a cross-site scripting (XSS) vulnerability identified in version 1.0 of the Campcodes Online Movie Theater Seat Reservation System. The vulnerability resides in the 'Reserve Your Seat' page, specifically within the /index.php?page=reserve endpoint. The issue arises from improper sanitization or validation of user-supplied input in the 'Firstname' and 'Lastname' parameters, allowing an attacker to inject malicious scripts. This vulnerability can be exploited remotely without requiring authentication, although user interaction is necessary to trigger the malicious payload, such as when a victim views a crafted page or input. The CVSS 4.0 score is 5.1, indicating a medium severity level. The attack vector is network-based with low attack complexity and no privileges required, but user interaction is needed to execute the attack. The impact primarily affects confidentiality and integrity at a low level, with no direct impact on availability or system control. Since the exploit has been publicly disclosed, there is an increased risk of exploitation, although no known active exploits have been reported in the wild. The vulnerability could be leveraged to steal session cookies, perform phishing, or conduct other client-side attacks against users of the system, potentially leading to account compromise or unauthorized actions within the reservation system.
Potential Impact
For European organizations operating or using the Campcodes Online Movie Theater Seat Reservation System, this vulnerability poses a risk to the confidentiality and integrity of user data. Attackers could exploit the XSS flaw to hijack user sessions, redirect users to malicious sites, or perform actions on behalf of users without their consent. This could lead to reputational damage, loss of customer trust, and potential regulatory scrutiny under GDPR if personal data is compromised. Although the direct impact on system availability is minimal, the indirect effects such as phishing or social engineering attacks could have broader security implications. Organizations relying on this system for customer interactions may face increased support costs and operational disruptions. The risk is heightened by the public disclosure of the exploit, which lowers the barrier for attackers to craft and deploy attacks targeting vulnerable installations.
Mitigation Recommendations
To mitigate this vulnerability, organizations should implement strict input validation and output encoding on all user-supplied data, particularly the 'Firstname' and 'Lastname' fields on the reservation page. Employing Content Security Policy (CSP) headers can help reduce the impact of XSS by restricting the execution of unauthorized scripts. Web Application Firewalls (WAFs) configured to detect and block XSS payloads can provide an additional layer of defense. Since no official patch is currently available, organizations should consider temporary workarounds such as disabling or restricting the vulnerable reservation functionality or sanitizing inputs at the web server or proxy level. Regular security assessments and penetration testing should be conducted to identify and remediate similar issues. User education on recognizing phishing and suspicious links is also recommended to reduce the risk of successful exploitation. Monitoring logs for unusual activity related to the reservation system can help detect attempted attacks early.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-07-18T19:36:34.280Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 687be0e9a83201eaacfe8872
Added to database: 7/19/2025, 6:16:09 PM
Last enriched: 7/27/2025, 12:59:48 AM
Last updated: 8/29/2025, 5:36:10 PM
Views: 31
Related Threats
CVE-2025-1391: Improper Access Control
MediumCVE-2025-9705: SQL Injection in SourceCodester Water Billing System
MediumCVE-2025-0750: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
MediumCVE-2025-0736: Insertion of Sensitive Information into Log File
MediumCVE-2025-9704: SQL Injection in SourceCodester Water Billing System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.