Summary
CVE ID: CVE-2025-60280
Vulnerability Type: Reflected Cross-Site Scripting (XSS)
Severity: Medium
CVSS Score: 6.1 (Estimated)
Date Published: October 13, 2025
Discovered by: Debug Security
Affected Product: Bang Resto v1.0
Vendor Confirmation: ✅ Yes
Vulnerability Description
A reflected Cross-Site Scripting (XSS) vulnerability has been identified in Bang Resto v1.0, a web-based restaurant management system. This flaw resides in the itemName
parameter, which fails to properly sanitize user input before rendering it on the page.
Attackers can exploit this vulnerability to inject arbitrary JavaScript code, potentially leading to:
- Session hijacking
- Phishing attacks
- Malicious redirections
- User impersonation
- Website defacement
This vulnerability has been assigned CVE-2025-60280 by MITRE.
Proof of Concept (PoC)
A simple payload can trigger the vulnerability as follows:
curl -k -b cookies.txt -X POST 'https://192.168.1.74/bangresto/admin/menu.php'
-H 'Content-Type: application/x-www-form-urlencoded'
--data 'addItem=&itemName=pHqghUme--><ScRiPt%20>alert('XSS')</ScRiPt><!--&itemPrice=1&menuID=1'
-s -o resp.html
Upon visiting the URL, the injected JavaScript executes in the victim’s browser, demonstrating a successful reflected XSS attack.
🔍 Technical Analysis
The vulnerability occurs due to lack of input validation and insufficient output encoding on the itemName
parameter.
- Component: itemName parameter in HTTP GET request
- Attack Vector: Remote / via browser
- Impact: Arbitrary JavaScript execution in the victim’s browser context
- CWE ID: CWE-79: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)
Recommendations
- Validate and sanitize all user inputs on both client and server sides.
- Use output encoding libraries such as OWASP’s Java Encoder or PHP’s
htmlspecialchars()
. - Implement Content Security Policy (CSP) headers to reduce script execution risks.
- Monitor logs for unusual parameter usage.
🔗 References
- Official CVE: CVE-2025-60280
- CWE: CWE-79 XSS
About the Researcher
This vulnerability was discovered by Debug Security, an independent security researcher focused on web application vulnerabilities and responsible disclosure.