VYPR
Low severity2.4NVD Advisory· Published Apr 28, 2026· Updated Apr 29, 2026

CVE-2026-7295

CVE-2026-7295

Description

A vulnerability has been found in SourceCodester Pizzafy Ecommerce System 1.0. Affected by this issue is the function save_menu of the file /admin/ajax.php?action=save_menu. Such manipulation of the argument Name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

CVE-2026-7295 is a stored XSS vulnerability in SourceCodester Pizzafy Ecommerce System 1.0 via the 'Name' argument in /admin/ajax.php?action=save_menu.

Vulnerability

Description

The vulnerability resides in the save_menu function of the /admin/ajax.php?action=save_menu endpoint in SourceCodester Pizzafy Ecommerce System 1.0. The application does not properly sanitize the Name argument, allowing an attacker to inject arbitrary JavaScript or HTML code. This is a classic case of cross-site scripting (XSS) caused by insufficient input validation [1].

Exploitation

Conditions

The attack can be launched remotely without requiring authentication, as the affected endpoint appears to be accessible to any visitor. The exploit has been publicly disclosed in a report [1], lowering the barrier for potential attackers. No special privileges or network position are needed beyond the ability to send a crafted HTTP request to the menu-saving functionality.

Impact

If exploited, an attacker can execute arbitrary client-side scripts in the context of an administrator's browser session. This could lead to session hijacking, defacement of the admin panel, or unauthorized actions on behalf of the logged-in administrator. However, the CVSS score of 2.7} results in a CVSS base score of 2.4 (Low), indicating that the impact is limited, likely because the attack requires user interaction (the admin viewing the stored payload) and the affected scope may be confined to the admin interface.

Mitigation and

Patch Status

As of the publication date (2026-04-28), there is no mention of an official patch from the vendor. The project is hosted on SourceCodester [2], which provides free source code and tutorials but does not always maintain regular security updates. Users should sanitize the Name parameter using proper output encoding or a reliable HTML escaping library as a temporary workaround until a patch is released.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.