Description
A security vulnerability has been detected in code-projects Simple Food Ordering System 1.0. Affected by this vulnerability is an unknown functionality of the file /ordersimple/order.php. The manipulation of the argument ID leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used.
References (5)
Core 5
Core References
Third Party Advisory, VDB Entry vdb-entry
technical-description
https://vuldb.com/?id.325194
Third Party Advisory, VDB Entry signature
permissions-required
https://vuldb.com/?ctiid.325194
Third Party Advisory, VDB Entry third-party-advisory
https://vuldb.com/?submit.657108
Permissions Required, VDB Entry exploit
https://github.com/asd1238525/cve/blob/main/xss3.md
Product product
https://code-projects.org/
Scores
CVSS v3
3.5
EPSS
0.0003
EPSS Percentile
7.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-79
CWE-94
Status
published
Products (1)
fabian/simple_food_ordering_system
1.0
Published
Sep 23, 2025
Tracked Since
Feb 18, 2026