| Title | code-projects Online Food Ordering System 1.0 Cross Site Scripting |
|---|
| Description | A vulnerability classified as problematic has been identified in Online Food Ordering System 1.0 by code-projects.org. Affected by this issue is an unknown functionality of the file /form/order.php within the Order Module. The manipulation of the argument cust_id leads to cross-site scripting (XSS).
The attack can be initiated remotely by crafting a malicious request containing a specially crafted value for the cust_id parameter. When processed by the application, the injected script is reflected in the server response and executed in the victim's browser context.
Successful exploitation may allow attackers to execute arbitrary JavaScript in the browser of the affected user, which could lead to session hijacking, credential theft or redirection to malicious websites.
The exploit has been disclosed to the public and may be used without authentication. |
|---|
| Source | ⚠️ https://gist.github.com/HxH404/f7f1502ffc9f2aacc936a6e8f290b6a5 |
|---|
| User | Abhiram T (UID 96000) |
|---|
| Submission | 03/10/2026 10:19 (21 days ago) |
|---|
| Moderation | 03/30/2026 15:36 (20 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 354189 [code-projects Online Food Ordering System 1.0 Order /form/order.php cust_id cross site scripting] |
|---|
| Points | 20 |
|---|