CVE-2025-12298

4.3 MEDIUM

📋 TL;DR

A cross-site scripting (XSS) vulnerability exists in code-projects Simple Food Ordering System 1.0, specifically in the /editcategory.php file's pname parameter. Attackers can inject malicious scripts that execute in users' browsers when they visit the affected page. This affects all deployments of Simple Food Ordering System 1.0 that have the vulnerable file accessible.

💻 Affected Systems

Products:
  • code-projects Simple Food Ordering System
Versions: 1.0
Operating Systems: Any
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default installation; requires /editcategory.php to be accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers steal session cookies, perform actions as authenticated users, redirect to malicious sites, or deploy malware to visitors' browsers.

🟠

Likely Case

Session hijacking, credential theft, or defacement of the food ordering interface affecting customer trust.

🟢

If Mitigated

Minimal impact with proper input validation and output encoding in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit details are publicly available; manipulation of pname parameter leads to XSS.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: https://code-projects.org/

Restart Required: No

Instructions:

No official patch available. Apply input validation and output encoding to /editcategory.php pname parameter.

🔧 Temporary Workarounds

Input Validation and Output Encoding

all

Sanitize pname parameter input and encode output to prevent script execution.

Edit /editcategory.php to add htmlspecialchars() or similar encoding around pname output.

Access Restriction

all

Restrict access to /editcategory.php to authorized users only.

Add authentication check at top of /editcategory.php file.

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block XSS payloads in pname parameter.
  • Disable or remove /editcategory.php if not required for functionality.

🔍 How to Verify

Check if Vulnerable:

Test by injecting <script>alert('XSS')</script> into pname parameter and check if script executes.

Check Version:

Check version in system documentation or configuration files; no standard command available.

Verify Fix Applied:

Re-test XSS payload; script should not execute and input should be properly encoded.

📡 Detection & Monitoring

Log Indicators:

  • Unusual pname parameter values containing script tags or JavaScript in access logs.

Network Indicators:

  • HTTP requests to /editcategory.php with suspicious pname payloads.

SIEM Query:

source="web_logs" AND uri_path="/editcategory.php" AND (param="pname" AND value MATCHES "<script.*>.*</script>" OR "javascript:")

🔗 References

📤 Share & Export