Impact
The vulnerability allows an attacker to inject arbitrary script into the cust_id parameter of the order.php page, resulting in client‑side script execution in the victim's browser. This can lead to page defacement, credential theft or redirection to malicious sites. The weakness is a persistent cross‑site scripting flaw and was validated in version 1.0 of the Online Food Ordering System’s Order module.
Affected Systems
Affected software is code‑projects Online Food Ordering System, version 1.0, specifically the Order module’s form/order.php file. The flaw exists in the unknown function that handles the cust_id argument.
Risk and Exploitability
The CVSS base score is 5.3, indicating moderate severity. The EPSS score is currently unavailable, and the vulnerability is not listed in the CISA KEV catalog, but it has publicly available exploits. Since the attack vector is remote and a crafted HTTP request can trigger the failure, the likelihood of exploitation is notable. Administrators should treat this as a medium‑risk issue that could impact confidentiality and integrity of user sessions.
OpenCVE Enrichment