First published: Tue Jan 07 2025(Updated: )
A vulnerability was found in code-projects Online Book Shop 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /booklist.php?subcatid=1. The manipulation of the argument subcatnm leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
code-projects Online Book Shop | ||
code-projects Online Book Shop | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-0295 is classified as problematic due to its potential for cross-site scripting attacks.
To fix CVE-2025-0295, sanitize and validate user input for the subcatnm parameter in the /booklist.php file.
CVE-2025-0295 can lead to unauthorized code execution, user session hijacking, and exposure of sensitive user data.
CVE-2025-0295 affects the code-projects Online Book Shop version 1.0.
To determine if you're vulnerable to CVE-2025-0295, check if your application allows the manipulation of the subcatnm parameter in the specified file.