code-projects Simple Food Ordering System 1.0 /editproduct.php pname/category/price Cross Site Scripting

Gaskiya vulnerability da aka ware a matsayin karshewa an samu a code-projects Simple Food Ordering System 1.0. Hakika, aikin $software_function ne ya shafa; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburaren $software_library, a cikin fayil /editproduct.php, a cikin sashen $software_component. A sa manipulation of the argument pname/category/price ka Cross Site Scripting. Idan an yi amfani da CWE don bayyana matsala, zai kai CWE-79. Hakika, rauni an bayyana shi 10/26/2025. An raba bayanin tsaro don saukewa a github.com. Wannan matsala ana saninta da CVE-2025-12302. Ngam yiɗi ka a tuma ndiyam ka nder layi. Tekinikal faɗi ga. Har ila yau, exploit ɗin yana nan. An bayyana exploit ɗin ga mutane kuma yana iya amfani. Yimbe ndiyam, exploit might be approx. USD $0-$5k wuro. Á sàmbu huɗɗi-na-gaskiya. Exploit ɗin za a iya saukewa daga github.com. 0-day shima, an ndiyam a wuro be $0-$5k. Once again VulDB remains the best source for vulnerability data.

2 Goyarwa · 86 Datenpunkte

FurɗeSúgá
10/26/2025 18:04
Gargadi 1/1
10/28/2025 02:36
software_vendorcode-projectscode-projects
software_nameSimple Food Ordering SystemSimple Food Ordering System
software_version1.01.0
software_file/editproduct.php/editproduct.php
software_argumentpname/category/pricepname/category/price
vulnerability_cweCWE-79 (Cross Site Scripting)CWE-79 (Cross Site Scripting)
vulnerability_risk11
cvss3_vuldb_avNN
cvss3_vuldb_acLL
cvss3_vuldb_prNN
cvss3_vuldb_uiRR
cvss3_vuldb_sUU
cvss3_vuldb_cNN
cvss3_vuldb_iLL
cvss3_vuldb_aNN
cvss3_vuldb_ePP
cvss3_vuldb_rcRR
advisory_urlhttps://github.com/underatted/CVE/issues/21https://github.com/underatted/CVE/issues/21
exploit_availability11
exploit_publicity11
exploit_urlhttps://github.com/underatted/CVE/issues/21https://github.com/underatted/CVE/issues/21
source_cveCVE-2025-12302CVE-2025-12302
cna_responsibleVulDBVulDB
software_typeProject Management SoftwareProject Management Software
cvss2_vuldb_avNN
cvss2_vuldb_acLL
cvss2_vuldb_auNN
cvss2_vuldb_ciNN
cvss2_vuldb_iiPP
cvss2_vuldb_aiNN
cvss2_vuldb_ePOCPOC
cvss2_vuldb_rcURUR
cvss4_vuldb_avNN
cvss4_vuldb_acLL
cvss4_vuldb_prNN
cvss4_vuldb_uiPP
cvss4_vuldb_vcNN
cvss4_vuldb_viLL
cvss4_vuldb_vaNN
cvss4_vuldb_ePP
cvss2_vuldb_rlNDND
cvss3_vuldb_rlXX
cvss4_vuldb_atNN
cvss4_vuldb_scNN
cvss4_vuldb_siNN
cvss4_vuldb_saNN
cvss2_vuldb_basescore5.05.0
cvss2_vuldb_tempscore4.34.3
cvss3_vuldb_basescore4.34.3
cvss3_vuldb_tempscore3.93.9
cvss3_meta_basescore4.34.3
cvss3_meta_tempscore3.94.1
cvss4_vuldb_bscore5.35.3
cvss4_vuldb_btscore2.12.1
advisory_date1761429600 (10/26/2025)1761429600 (10/26/2025)
price_0day$0-$5k$0-$5k
cve_nvd_summaryA vulnerability was detected in code-projects Simple Food Ordering System 1.0. The affected element is an unknown function of the file /editproduct.php. Performing manipulation of the argument pname/category/price results in cross site scripting. The attack may be initiated remotely. The exploit is now public and may be used.
cvss4_cna_avN
cvss4_cna_acL
cvss4_cna_atN
cvss4_cna_prN
cvss4_cna_uiP
cvss4_cna_vcN
cvss4_cna_viL
cvss4_cna_vaN
cvss4_cna_scN
cvss4_cna_siN
cvss4_cna_saN
cvss4_cna_bscore5.3
cvss3_cna_avN
cvss3_cna_acL
cvss3_cna_prN
cvss3_cna_uiR
cvss3_cna_sU
cvss3_cna_cN
cvss3_cna_iL
cvss3_cna_aN
cvss3_cna_basescore4.3
cvss2_cna_avN
cvss2_cna_acL
cvss2_cna_auN
cvss2_cna_ciN
cvss2_cna_iiP
cvss2_cna_aiN
cvss2_cna_basescore5

Do you want to use VulDB in your project?

Use the official API to access entries easily!