Impact
The vulnerability resides in the booknow.php endpoint of the Online Hotel Booking application, where the roomname parameter is reflected in the page output without proper sanitization. This flaw enables an attacker to inject arbitrary HTML and JavaScript that is executed in the browsers of users who view the affected page. The impact is typical of a reflected XSS: attackers could hijack user sessions, steal cookies, deface content, or exfiltrate data. The weakness corresponds to the CWE identifiers for unsanitized input (CWE‑79) and potential code injection (CWE‑94).
Affected Systems
This issue affects the Code Projects Online Hotel Booking product, specifically version 1.0 of the booking endpoint. No other versions are listed as impacted in the available vendor data.
Risk and Exploitability
The CVSS score is 5.3, indicating a moderate severity level. While the EPSS score is unavailable, the vulnerability is publicly exploitable via a straightforward HTTP request to the booknow.php page with a crafted roomname value. It is not currently listed in the CISA KEV catalog, but because the exploit is available and can be launched remotely, the practical risk remains significant. Attackers do not need special privileges; simply visiting a malicious URL suffices to trigger the XSS execution. The risk is therefore tangible for any site running the vulnerable version.
OpenCVE Enrichment