CVE-2026-30527
Received Received - Intake
Stored XSS in SourceCodester Food Ordering Admin Category Module

Publication date: 2026-03-27

Last updated on: 2026-04-06

Assigner: MITRE

Description
A Stored Cross-Site Scripting (XSS) vulnerability exists in SourceCodester Online Food Ordering System v1.0 in the Category management module within the admin panel. The application fails to properly sanitize user input supplied to the "Category Name" field when creating or updating a category. When an administrator or user visits the Category list page (or any page where this category is rendered), the injected JavaScript executes immediately in their browser.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-27
Last Modified
2026-04-06
Generated
2026-05-07
AI Q&A
2026-03-27
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
oretnom23 online_food_ordering_system 1.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-30527 is a Stored Cross-Site Scripting (XSS) vulnerability found in the Online Food Ordering System version 1.0, specifically in the Category management module within the admin panel.

The vulnerability occurs because the application does not properly sanitize user input supplied to the "Category Name" field when creating or updating a category.

Malicious JavaScript code injected into this field is stored persistently in the system's database. When an administrator or user visits the Category list page or any page where the affected category is displayed, the injected script executes immediately in their browser.

This means that an attacker can inject harmful scripts that run automatically without further user interaction, potentially compromising the security of the application and its users.


How can this vulnerability impact me? :

This vulnerability can have several serious impacts:

  • Persistent execution of malicious scripts in the browsers of administrators or users who visit affected pages.
  • Potential session hijacking through theft of administrator cookies, which can lead to unauthorized access.
  • Permanent defacement or alteration of the application's interface, damaging the integrity and trustworthiness of the system.

How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by attempting to inject a known XSS payload into the Category Name field within the admin panel's Category Maintenance module and observing if the payload executes when the Category list page is loaded.

Steps to detect the vulnerability include:

  • Log in as an administrator (default credentials: admin/admin).
  • Navigate to the Maintenance -> Category List page at /admin/?page=maintenance.
  • Create or update a category by injecting a test XSS payload such as `<img src="x" onerror="alert(778899)">` into the Category Name field.
  • Save the category and then revisit the Category list page.

If the alert box with the number 778899 appears, it confirms the presence of the stored XSS vulnerability.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include:

  • Avoid using the Category Name input field until proper input sanitization is implemented.
  • Restrict administrative access to trusted users only and ensure strong authentication mechanisms are in place.
  • Manually review and remove any suspicious or malicious scripts injected into the Category Name fields in the database.
  • Apply input validation and output encoding on the Category Name field to prevent execution of injected scripts.
  • Monitor user sessions and logs for any signs of exploitation or unauthorized access.

How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The Stored Cross-Site Scripting (XSS) vulnerability in the Online Food Ordering System allows malicious scripts to execute in the browsers of administrators or users. This can lead to session hijacking and unauthorized access to sensitive information.

Such unauthorized access and potential data breaches could violate common standards and regulations like GDPR and HIPAA, which require protection of personal data and secure handling of user sessions.

Therefore, the vulnerability poses a risk to compliance by potentially exposing sensitive user data and failing to ensure secure application behavior.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart