CVE-2025-56276

5.4 MEDIUM

📋 TL;DR

This XSS vulnerability in code-projects Food Ordering Review System 1.0 allows attackers to inject malicious JavaScript via the registration username field. When an administrator views user information, the script executes in their browser context, potentially stealing session cookies. This affects all deployments of version 1.0 that have user registration enabled.

💻 Affected Systems

Products:
  • code-projects Food Ordering Review System
Versions: 1.0
Operating Systems: Any OS running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default installation when registration functionality is enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Administrator session hijacking leading to full system compromise, data theft, or privilege escalation within the application.

🟠

Likely Case

Session cookie theft allowing attacker to impersonate administrators and modify system settings or user data.

🟢

If Mitigated

Limited impact if proper input validation and output encoding are implemented, restricting script execution.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user registration capability and administrator interaction with user data.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown - check vendor for updated version

Vendor Advisory: https://code-projects.org/food-ordering-review-system-in-php-with-source-code/

Restart Required: No

Instructions:

1. Download updated version from code-projects.org. 2. Replace vulnerable files. 3. Test registration functionality with XSS payloads.

🔧 Temporary Workarounds

Input Validation and Sanitization

all

Add server-side validation to reject or sanitize special characters in username field

Add PHP validation: preg_match('/^[a-zA-Z0-9_]+$/', $username)

Output Encoding

all

Apply HTML entity encoding when displaying user data in admin interface

Use htmlspecialchars($username, ENT_QUOTES, 'UTF-8') when outputting

🧯 If You Can't Patch

  • Disable user registration functionality entirely
  • Implement web application firewall (WAF) rules to block XSS payloads in registration requests

🔍 How to Verify

Check if Vulnerable:

Attempt to register with username containing: <script>alert('XSS')</script> and check if script executes when admin views user

Check Version:

Check source code files for version information or review installation documentation

Verify Fix Applied:

Test with same XSS payloads and verify they are either blocked or properly encoded in output

📡 Detection & Monitoring

Log Indicators:

  • Registration attempts with script tags or JavaScript in username field
  • Unusual admin session activity following user registration

Network Indicators:

  • HTTP POST requests to registration endpoint containing script tags or JavaScript

SIEM Query:

source="web_logs" AND (uri_path="/register.php" OR uri_path="/registration") AND (request_body CONTAINS "<script>" OR request_body CONTAINS "javascript:")

🔗 References

📤 Share & Export