Description
A Stored Cross-Site Scripting (XSS) vulnerability exists in SourceCodester Online Food Ordering System v1.0 in the Category management module within the admin panel. The application fails to properly sanitize user input supplied to the "Category Name" field when creating or updating a category. When an administrator or user visits the Category list page (or any page where this category is rendered), the injected JavaScript executes immediately in their browser.
Published: 2026-03-27
Score: n/a
EPSS: n/a
KEV: No
Impact: Stored Cross‑Site Scripting (XSS)
Action: Patch
AI Analysis

Impact

A stored cross‑site scripting vulnerability exists in the Category management module of the SourceCodester Online Food Ordering System v1.0. When an administrator or privileged user creates or updates a category, the application fails to sanitize input supplied to the Category Name field. The injected JavaScript is persisted and executed automatically whenever the category is rendered in the admin‑panel or public Category list page. The primary impact of this flaw is that any user who views the affected page can have arbitrary JavaScript executed in their browser, enabling attackers to hijack sessions, steal credentials, deface the site, or perform further malicious actions in the victim’s context. This weakness is classified as a CWE‑79 input validation failure that leads to stored cross‑site scripting.

Affected Systems

The issue is limited to the SourceCodester Online Food Ordering System version 1.0. No other vendors, products, or versions are listed in the advisory. The flaw exists specifically in the admin panel’s Category Name input configuration and is not reported to affect any other components of the application.

Risk and Exploitability

The stored payload does not require any external trigger beyond the initial creation or editing of a category; once a malicious string is stored, every subsequent view of the category will execute the script. Exploitation is straightforward for an attacker who can authenticate as a user with enough privileges to add or update categories. While the CVSS score and EPSS metric are not publicly available, the advisory indicates the absence of mitigation, suggesting a high likelihood of exploitation. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog, but the potential harm to confidentiality and integrity of user sessions warrants immediate attention.

Generated by OpenCVE AI on March 27, 2026 at 17:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply an available vendor patch for SourceCodester Online Food Ordering System v1.0 to add input validation for the Category Name field.
  • If a patch is not available, implement server‑side sanitization of the Category Name input and ensure proper output encoding when rendering the value.
  • Add a Content Security Policy that blocks inline scripts to reduce the impact of any stored XSS payload.
  • Limit category creation and update permissions to trusted administrator accounts only.
  • Enable logging and monitor for anomalous category creation or modification activity.

Generated by OpenCVE AI on March 27, 2026 at 17:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Mar 2026 20:30:00 +0000

Type Values Removed Values Added
Title Stored XSS in Category Name Field of SourceCodester Online Food Ordering System v1.0
Weaknesses CWE-79

Fri, 27 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Description A Stored Cross-Site Scripting (XSS) vulnerability exists in SourceCodester Online Food Ordering System v1.0 in the Category management module within the admin panel. The application fails to properly sanitize user input supplied to the "Category Name" field when creating or updating a category. When an administrator or user visits the Category list page (or any page where this category is rendered), the injected JavaScript executes immediately in their browser.
References

Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-03-27T16:03:16.119Z

Reserved: 2026-03-04T00:00:00.000Z

Link: CVE-2026-30527

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-27T16:16:23.327

Modified: 2026-03-27T16:16:23.327

Link: CVE-2026-30527

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T20:26:00Z

Weaknesses