A vulnerability, which was classified as problematic, was found in CodeAstro Food Ordering System 1.0. Affected is an unknown function of the file /admin/store/edit/ of the component POST Request Parameter Handler. The manipulation of the argument Restaurant Name/Address leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
References
| Link | Resource |
|---|---|
| https://codeastro.com/ | Product |
| https://github.com/Vanshdhawan188/Food-Ordering-System-in-PHP-CodeIgniter-/blob/main/Stored%20Cross-Site%20Scripting%20(XSS).md | Exploit Third Party Advisory Mitigation |
| https://vuldb.com/?ctiid.312600 | Permissions Required VDB Entry |
| https://vuldb.com/?id.312600 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.592780 | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2025-06-16 17:15
Updated : 2025-07-18 12:46
NVD link : CVE-2025-6131
Mitre link : CVE-2025-6131
CVE.ORG link : CVE-2025-6131
JSON object : View
Products Affected
codeastro
- food_ordering_system
