CVE-2025-13802

4.3 MEDIUM

📋 TL;DR

This CVE describes a cross-site scripting (XSS) vulnerability in the 'Make a Reservation' component of jairiidriss RestaurantWebsite. Attackers can inject malicious scripts via the selected_date parameter, potentially compromising user sessions or stealing sensitive data. All users of affected versions are vulnerable to this remote attack.

💻 Affected Systems

Products:
  • jairiidriss RestaurantWebsite
Versions: All versions up to commit e7911f12d035e8e2f9a75e7a28b59e4ef5c1d654
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Continuous delivery with rolling releases means no specific version numbers are available. All deployments using vulnerable code are affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal user session cookies, redirect users to malicious sites, perform actions on behalf of authenticated users, or deface the website.

🟠

Likely Case

Attackers inject malicious JavaScript to steal session cookies or redirect users to phishing pages, potentially compromising user accounts.

🟢

If Mitigated

With proper input validation and output encoding, the XSS payloads would be neutralized, preventing script execution.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The exploit has been publicly disclosed and can be initiated remotely without authentication. Attack details are available in the referenced GitHub report.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None

Restart Required: No

Instructions:

No official patch available. The vendor did not respond to disclosure. Consider applying community fixes or implementing workarounds.

🔧 Temporary Workarounds

Input Validation and Sanitization

all

Implement server-side validation and sanitization of the selected_date parameter to prevent XSS payloads.

Implement input validation in the reservation handler code

Content Security Policy (CSP)

all

Deploy a strict CSP header to mitigate XSS impact by restricting script execution sources.

Add 'Content-Security-Policy' header to web server configuration

🧯 If You Can't Patch

  • Implement a Web Application Firewall (WAF) with XSS protection rules
  • Disable the 'Make a Reservation' feature if not essential

🔍 How to Verify

Check if Vulnerable:

Test the 'Make a Reservation' feature by injecting XSS payloads into the selected_date parameter and checking if scripts execute.

Check Version:

Check git commit hash against e7911f12d035e8e2f9a75e7a28b59e4ef5c1d654

Verify Fix Applied:

After implementing fixes, test with XSS payloads to ensure scripts no longer execute and input is properly sanitized.

📡 Detection & Monitoring

Log Indicators:

  • Unusual characters or script patterns in selected_date parameter logs
  • Multiple failed reservation attempts with suspicious input

Network Indicators:

  • HTTP requests with script tags or JavaScript in selected_date parameter

SIEM Query:

web.url:*selected_date=*<script* OR web.url:*selected_date=*javascript:*

🔗 References

📤 Share & Export