Impact
A flaw in the /admin/admin_product.php page of the code‑projects Online Shoe Store allows an attacker to control the product_name parameter and inject arbitrary JavaScript. The injected script runs in the web browser of anyone who views the page, which can lead to session hijacking, defacement, or phishing attempts. The weakness is a classic cross‑site scripting (CWE‑79) vulnerability and may also enable code injection via the same input field (CWE‑94).
Affected Systems
The affected product is code‑projects Online Shoe Store version 1.0. The vulnerability exists in the admin_product.php component and no other versions or products are listed as affected.
Risk and Exploitability
The CVSS score of 4.8 indicates a moderate risk. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog. Attack can be initiated remotely by sending an HTTP request to the vulnerable endpoint; an attacker does not need local or privileged access, although the page is part of an admin interface. Exploitation requires only the ability to inject a payload such as ?product_name=<script>alert(1)</script> into the request.
OpenCVE Enrichment