CVE-2025-12300
📋 TL;DR
This vulnerability allows attackers to inject malicious scripts into the Simple Food Ordering System 1.0 through the cname parameter in /addcategory.php. The cross-site scripting (XSS) attack can be executed remotely, potentially compromising user sessions or stealing sensitive data. Organizations using this specific version of the software are affected.
💻 Affected Systems
- Simple Food Ordering System
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers could steal administrator credentials, hijack user sessions, deface the website, or redirect users to malicious sites, potentially leading to complete system compromise.
Likely Case
Session hijacking, cookie theft, or credential harvesting from users who interact with the vulnerable page.
If Mitigated
Limited impact with proper input validation and output encoding in place, potentially only affecting users who directly access malicious links.
🎯 Exploit Status
Exploit details are publicly available, making this easily exploitable by attackers with basic web security knowledge.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: https://code-projects.org/
Restart Required: No
Instructions:
Check vendor website for updates. If no patch exists, implement input validation and output encoding in /addcategory.php.
🔧 Temporary Workarounds
Input Validation and Sanitization
allImplement server-side validation and sanitization of the cname parameter to strip or encode malicious scripts.
Web Application Firewall (WAF)
allDeploy a WAF with XSS protection rules to block malicious payloads targeting the cname parameter.
🧯 If You Can't Patch
- Restrict access to /addcategory.php to trusted IP addresses only.
- Implement Content Security Policy (CSP) headers to mitigate XSS impact.
🔍 How to Verify
Check if Vulnerable:
Test by injecting a simple XSS payload like <script>alert('test')</script> into the cname parameter of /addcategory.php and check if it executes.
Check Version:
Check the software version in the admin panel or configuration files; look for 'Simple Food Ordering System 1.0'.
Verify Fix Applied:
After applying fixes, retest with the same XSS payload to ensure it is properly sanitized or blocked.
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to /addcategory.php with script tags or JavaScript in parameters
- Multiple failed login attempts following XSS payloads
Network Indicators:
- HTTP requests containing <script> tags or encoded JavaScript in the cname parameter
SIEM Query:
source="web_logs" AND uri="/addcategory.php" AND (param="cname" AND value CONTAINS "<script>" OR value CONTAINS "javascript:")