CVE-2026-5157: Cross Site Scripting in code-projects Online Food Ordering System
CVE-2026-5157 is a medium severity cross-site scripting (XSS) vulnerability found in version 1. 0 of the code-projects Online Food Ordering System. The vulnerability exists in the /form/order. php file within the Order Module, specifically involving the cust_id parameter. An attacker can remotely exploit this flaw by manipulating the cust_id argument to inject malicious scripts. No authentication or privileges are required to exploit this vulnerability, but user interaction is needed to trigger the XSS payload. While no known exploits are currently in the wild, a public exploit is available, increasing the risk of exploitation. This vulnerability can lead to client-side script execution, potentially compromising user data and session integrity. Organizations using this software should prioritize patching or applying mitigations to prevent exploitation. Countries with significant deployment of this software or with large online food ordering markets are at higher risk.
AI Analysis
Technical Summary
CVE-2026-5157 is a cross-site scripting (XSS) vulnerability identified in the code-projects Online Food Ordering System version 1.0. The vulnerability resides in the Order Module, specifically in the /form/order.php file, where the cust_id parameter is improperly sanitized or validated. This allows an attacker to inject malicious JavaScript code that executes in the context of the victim's browser when the crafted URL or input is processed. The attack vector is remote and does not require any authentication or privileges, making it accessible to unauthenticated attackers. However, user interaction is necessary to trigger the payload, such as clicking a malicious link or submitting a crafted form. The vulnerability has a CVSS 4.0 base score of 5.3, reflecting medium severity, with the vector indicating network attack vector, low attack complexity, no privileges required, and user interaction required. The impact primarily affects confidentiality and integrity at a limited level, as the injected scripts can steal session cookies, perform actions on behalf of the user, or manipulate the user interface. No patches or official fixes have been linked yet, and although no known exploits are currently active in the wild, a public exploit is available, increasing the urgency for mitigation. This vulnerability highlights the importance of proper input validation and output encoding in web applications, especially those handling sensitive transactions like food ordering.
Potential Impact
The exploitation of CVE-2026-5157 can lead to the execution of arbitrary scripts in the browsers of users interacting with the vulnerable Online Food Ordering System. This can result in theft of session cookies, enabling account hijacking, unauthorized actions performed on behalf of users, defacement of the user interface, or redirection to malicious sites. For organizations, this can lead to loss of customer trust, potential data breaches, and reputational damage. Since the vulnerability affects an online food ordering platform, it may also disrupt business operations and customer experience. The medium severity score reflects that while the vulnerability does not directly compromise server-side systems or data, the client-side impact can cascade into broader security issues. The availability of a public exploit increases the likelihood of attempted attacks, especially targeting customers of affected businesses. Organizations relying on this software without mitigation are at risk of targeted phishing campaigns and session hijacking attacks.
Mitigation Recommendations
To mitigate CVE-2026-5157, organizations should first seek any official patches or updates from the vendor and apply them promptly once available. In the absence of patches, implement strict input validation and output encoding on the cust_id parameter to neutralize malicious scripts. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. Use web application firewalls (WAFs) to detect and block malicious payloads targeting the vulnerable parameter. Educate users about the risks of clicking suspicious links and encourage the use of updated browsers with built-in XSS protections. Regularly audit and test the application for similar injection flaws. Additionally, consider isolating the vulnerable module or disabling the affected functionality temporarily if feasible until a fix is deployed. Monitoring logs for unusual requests targeting /form/order.php can help detect exploitation attempts early.
Affected Countries
United States, India, United Kingdom, Canada, Australia, Germany, France, Brazil, South Africa, Singapore
CVE-2026-5157: Cross Site Scripting in code-projects Online Food Ordering System
Description
CVE-2026-5157 is a medium severity cross-site scripting (XSS) vulnerability found in version 1. 0 of the code-projects Online Food Ordering System. The vulnerability exists in the /form/order. php file within the Order Module, specifically involving the cust_id parameter. An attacker can remotely exploit this flaw by manipulating the cust_id argument to inject malicious scripts. No authentication or privileges are required to exploit this vulnerability, but user interaction is needed to trigger the XSS payload. While no known exploits are currently in the wild, a public exploit is available, increasing the risk of exploitation. This vulnerability can lead to client-side script execution, potentially compromising user data and session integrity. Organizations using this software should prioritize patching or applying mitigations to prevent exploitation. Countries with significant deployment of this software or with large online food ordering markets are at higher risk.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-5157 is a cross-site scripting (XSS) vulnerability identified in the code-projects Online Food Ordering System version 1.0. The vulnerability resides in the Order Module, specifically in the /form/order.php file, where the cust_id parameter is improperly sanitized or validated. This allows an attacker to inject malicious JavaScript code that executes in the context of the victim's browser when the crafted URL or input is processed. The attack vector is remote and does not require any authentication or privileges, making it accessible to unauthenticated attackers. However, user interaction is necessary to trigger the payload, such as clicking a malicious link or submitting a crafted form. The vulnerability has a CVSS 4.0 base score of 5.3, reflecting medium severity, with the vector indicating network attack vector, low attack complexity, no privileges required, and user interaction required. The impact primarily affects confidentiality and integrity at a limited level, as the injected scripts can steal session cookies, perform actions on behalf of the user, or manipulate the user interface. No patches or official fixes have been linked yet, and although no known exploits are currently active in the wild, a public exploit is available, increasing the urgency for mitigation. This vulnerability highlights the importance of proper input validation and output encoding in web applications, especially those handling sensitive transactions like food ordering.
Potential Impact
The exploitation of CVE-2026-5157 can lead to the execution of arbitrary scripts in the browsers of users interacting with the vulnerable Online Food Ordering System. This can result in theft of session cookies, enabling account hijacking, unauthorized actions performed on behalf of users, defacement of the user interface, or redirection to malicious sites. For organizations, this can lead to loss of customer trust, potential data breaches, and reputational damage. Since the vulnerability affects an online food ordering platform, it may also disrupt business operations and customer experience. The medium severity score reflects that while the vulnerability does not directly compromise server-side systems or data, the client-side impact can cascade into broader security issues. The availability of a public exploit increases the likelihood of attempted attacks, especially targeting customers of affected businesses. Organizations relying on this software without mitigation are at risk of targeted phishing campaigns and session hijacking attacks.
Mitigation Recommendations
To mitigate CVE-2026-5157, organizations should first seek any official patches or updates from the vendor and apply them promptly once available. In the absence of patches, implement strict input validation and output encoding on the cust_id parameter to neutralize malicious scripts. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. Use web application firewalls (WAFs) to detect and block malicious payloads targeting the vulnerable parameter. Educate users about the risks of clicking suspicious links and encourage the use of updated browsers with built-in XSS protections. Regularly audit and test the application for similar injection flaws. Additionally, consider isolating the vulnerable module or disabling the affected functionality temporarily if feasible until a fix is deployed. Monitoring logs for unusual requests targeting /form/order.php can help detect exploitation attempts early.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-03-30T13:36:47.061Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69cb096be6bfc5ba1d7e1fbe
Added to database: 3/30/2026, 11:38:19 PM
Last enriched: 3/30/2026, 11:53:32 PM
Last updated: 3/31/2026, 1:48:50 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.