| Título | code-projects Online Food Ordering System 1.0 Cross Site Scripting |
|---|
| Descrição | A vulnerability classified as problematic has been identified in Online Food Ordering System 1.0 by code-projects.org. Affected by this issue is an unknown functionality of the file /form/order.php within the Order Module. The manipulation of the argument cust_id leads to cross-site scripting (XSS).
The attack can be initiated remotely by crafting a malicious request containing a specially crafted value for the cust_id parameter. When processed by the application, the injected script is reflected in the server response and executed in the victim's browser context.
Successful exploitation may allow attackers to execute arbitrary JavaScript in the browser of the affected user, which could lead to session hijacking, credential theft or redirection to malicious websites.
The exploit has been disclosed to the public and may be used without authentication. |
|---|
| Fonte | ⚠️ https://gist.github.com/HxH404/f7f1502ffc9f2aacc936a6e8f290b6a5 |
|---|
| Utilizador | Abhiram T (UID 96000) |
|---|
| Submissão | 10/03/2026 10h19 (há 24 dias) |
|---|
| Moderação | 30/03/2026 15h36 (20 days later) |
|---|
| Estado | Aceite |
|---|
| Entrada VulDB | 354189 [code-projects Online Food Ordering System 1.0 Order /form/order.php cust_id Script de Site Cruzado] |
|---|
| Pontos | 20 |
|---|